Sunday, June 16, 2019
Design System and Security Control Essay Example | Topics and Well Written Essays - 3250 words
Design System and Security Control - Essay ExampleThis includes drug user errors, malicious and non-malicious attacks, accidents as well as external attack from hackers, who strive to gain access to the strategy and disrupt the various system operations hence rendering it useless, or selective information alteration or even data loss. There are a number of system security and control requirements that are required for the implementation of the ACA Technology. The system will need protection in terms of the following aspects of data. The system should ensure confidentiality. This implies that the system should hold information that requires its protection from any unauthorized disclosures. This includes personal information as well as business proprietary information. Authentication Secondly, authentication is another important aspect of any accustomed system. This is defined as the act of establishing the identity of a assumption user as well as the host being used. The first ob jective of authentication is usually first to establish that the given person and/ or system which is attempting to gain access to the system has the permission to do so. The second objective is usually the gathering of the information detailing the way the particular user is gaining access to the system. Smart cards, bank cards, computer chips are used to identify the identity of a given person. Some of the devices require the user to also picture a password or personal identification number (PIN) to verify their identity. The third method is by use of Biometric identification. This method uses the Biometric science that identifies a given person based on their physical characteristics. This includes voice recognition, palm, thumbprint identification as well as retinal scan. Authorization Thirdly is the authorization which is another rattling aspect of system control. This is defined as the act of determining the access level that a particular user has to behavior and data. Under this aspect of system control, effective approaches to authorization need to be first established. A number of questions need to be addressed i.e. What shall we control access to? As we know its possible to implement secure access to both data and functionality for example access to monthly sales figures and the ability to fire a given employee respectively. opus this is being done a number of factors need to be checked to ensure that the implementation is cost effective and conforms to the performance constraints. The second question that arises is what rules shall be applicable? to be in a position to answer this question effectively, the stakeholders requirements need to be factored in and included should be other security factors which the stakeholders may not be aware of. These factors will include the connection type, update access, the time of the day, the existence, privileges level, global permissions etc.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment