The Dynamism of Access Control Essay

The Dynamism of Access Control Essay

Length: 2713 words (7.8 double-spaced pages)

Rating: Powerful Essays

Open Document

Essay Preview

Heterogeneous and dynamic environments creates a need for a viable access control system in such a way that the security of data and information will be solidly ensured. Organizations have various types of resources that need access regulation. The purpose of which is to make sure that only the intended can access the resources while keeping the unauthorized person out of the loop. Even at that, hierarchy, type and the degree of task delegated to a user will determine the level of access that he or she will be granted. For example, a user with role “accountant” normally has different access rights than user with role “supervisor”. The sensitivity of resources is directly proportional to the security level mounted upon the resources and likewise the degree of access.
Many challenges are witnessed during the course of implementing access control mechanism in information security, and all of them cannot be dealt with equally. This development introduced threat to information security which consequently sets in the requirement for appropriate countermeasures in ensuring risk of losing sensitive and important data into the hands of unauthorized users are mitigated. In this paper, the role played by the access control models in dictating the path in granting or denying specific access requests will be investigated in a dynamic information security environment.
Current researches studies many methodologies and appreciations for the evaluation and implementation of protection and controls with information privacy [4]. However, since access control application is a major factor in information system security, there is a need for building a dynamic access control policy. These policies form the certificatory, regulatory and, legislator requ...

... middle of paper ...

... the audit data collection and organization, and analysis of the data to unravel security and access control policies violation (Lunt, 1993; Mukherjee, Heberlein & Levitt, 1994).
Consequently, audit data requires additional protection from modification by an attacker or intruder. But incidentally, analysis of audit data are in most case performed whenever a foul-play is suspected. Intrusion Detection System (IDS) is one of the key tools that seeks to help perform access control audit.
Today, access control audit is inevitable, mostly in IT industry. Seeing the recent database usage increase, growth of networks access points (most especially in remote connectivity), and rate at which wireless technologies evolve, it is absolutely essential to assess the efficiency of the available access control mechanism to verify the alignment of protection-level to the risk-level.

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay on Comparison Between Mandatory Access Control

- Comparison between Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC) Models in Database Management Systems Abstract This paper includes the comparison between access control models Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC) and explores the advantages and disadvantages of implementing the subjected models. They provides the fundamental policy and rules for the system level access control....   [tags: Access control, Mandatory access control, XACML]

Powerful Essays
3144 words (9 pages)

What Are The Three Principle Components Of Access Control For A Trusted Computer System Infrastructure?

- In this article, the author discusses the benefits of employing Role Based Access Control (RBAC) as an Access Control. Galante makes many valid points and has demonstrated how using RBAC has many benefits to an organization. A few cases differentiate RBAC and the simple access control model. Although the author suggest RBAC as an optimal solution; RBAC certainly isn 't a cure all, however, it is ideal for a variety of circumstances. When RBAC is deployed properly and in the ideal situation, it can compensate the organization with financial, security and responsibility benefits....   [tags: Access control, Mandatory access control]

Powerful Essays
824 words (2.4 pages)

Information Security Policy And Access Control Policy Essay

- Information Security Policy BY Jianing Wu 300365997 Background for the Information Security Policy The information technology has been developing at an incredible speed from the 20th century, which has been recognised and widely used in people’s diary life now- people’s personal profile details on the social media, payment details and even businesses using the information technology to make, transfer and analysis their annual income reports. However, as the information technology is becoming an important role in our lives, how to protect the valuable information from being abused has become the topic that people concern more about right now....   [tags: Security, Access control, Information security]

Powerful Essays
853 words (2.4 pages)

Questions And Access Of Personal Information Essay

- Update and access of personal information If you wish to make any changes to your personal information, please contact us. We will generally rely on you to assist us in informing us if the information we hold about you is inaccurate or incomplete. You may request access to the personal information we hold about you by contacting us. We will respond to your request within a reasonable period. We will give access in the manner you have requested if it is reasonable to do so. We may charge you a fee to access the information....   [tags: Security, Computer security, Access control]

Powerful Essays
1141 words (3.3 pages)

Teenagers Should Have Access to Birth Control Essay

- Imagine you are sitting in the doctor’s office awkwardly with your mom. The doctor comes in, checks you out and asks a few questions. You fear him asking “Are you sexually active?” Your mom is sitting across from you and you are afraid what she is going to think of you when you answer “Yes.” to the question. You want to do the right thing and get on birth control to be safe, but you know your mom will say no. Girls in the 21st century should have the right to protect themselves with any sort of birth control they choose without parents’ consent....   [tags: Contraceptives, Birth Control Essays]

Powerful Essays
986 words (2.8 pages)

An Introduction to Access Control Mechanisms Essay

- Abstract: With increasing attacks and internal data theft the organizations must strengthen their database security beyond the traditional methods, especially those databases which hold private data. This can be done by developing a security strategy which is a framework of control mechanisms for authentication, authorization, and access control mechanisms to enforce role separation, database auditing, monitoring, network and data encryption, data masking according to the needs and environment in the organization....   [tags: Information Technology]

Powerful Essays
1930 words (5.5 pages)

Environmental Dynamism Essay example

- Environmental dynamism, along with environmental change and environmental uncertainty, serves a significant role in organizations. The definition of environmental dynamism is the “degree to which important environmental components change” (Griffin & Moorehead, 2012, p. 471). The dynamics of an environment can influence the types of environment, leadership styles, and management controls of organizations. Therefore, it is important to understand how organizations are impacted by environmental dynamics in order to ascertain the most effective ways for organizations to perform....   [tags: Charismatic Leadership, Real Estate]

Powerful Essays
1668 words (4.8 pages)

Security Controls Are Technical Or Administrative Safeguards Essays

- Case 5 Security controls are technical or administrative safeguards or counter measures to avoid, counteract or minimize loss or unavailability due to threats acting on their matching vulnerability, i.e., security risk. Controls are referenced all the time in security, but they are rarely defined. The purpose of this section is to define technical, administrative/personnel, preventative, detective, and corrective compensating controls, as well as general controls. Basically they are categorized in following way • Preventive • Corrective • Detective Secure Configurations for Network Devices Think about firewall, switch, and switch arrangement against standard secure setups characterized for e...   [tags: Security, Physical security, Access control]

Powerful Essays
754 words (2.2 pages)

Remote Access Attacks Essay

- Introduction Remote access can be clearly defined as one’s ability to gain computer or network access from a remote location. Today many business people who travel often need to have remote access to their corporation's network. There is however vulnerabilities that all types of remote access have common, and it doesn’t matter what method used, the endpoint machine is vulnerable like all other systems that have access to the Internet. Whenever a system is accessible via the internet, that system is exposed to danger....   [tags: Computer, Network Access, Remote Location]

Powerful Essays
1331 words (3.8 pages)

System Access Controls Essay

- 1. The most common types of system access controls Access control determines allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system and prevent unauthorized users to access the system. It requires unique user identification, emergency access procedure, automatic log-off, and encryption and decryption of data. Some common types of access control include: User-based, Role-based and Context-based access control with the strongest security on Context-based access control....   [tags: Information Technology]

Powerful Essays
1004 words (2.9 pages)