System Access Controls

1004 Words3 Pages

1. The most common types of system access controls

Access control determines allowed activities of legitimate users, mediating every attempt by a user to access a resource in the system and prevent unauthorized users to access the system. It requires unique user identification, emergency access procedure, automatic log-off, and encryption and decryption of data. Some common types of access control include: User-based, Role-based and Context-based access control with the strongest security on Context-based access control. “LaTour, Kathleen M. (2010) AHIMA. Health Information Management – Concepts, Principles and Practice– 3rd edition. Chapter 9 Pages 255”.

The steps of access control process are:

a) Identification to unique user ID. It can be a combination of first and last name.

b) Authentication which contains known by user (like password, PIN, Phrase and pass code), accessories own by user (like Keypads, smart cards and tokens) and something personally related to the user’s body (Biometric systems including voice recognition, fingerprinting and retinal scanners).

c) Accounting which limits access of the users to the minimum necessity. Accountability for user’s action needs to control by audit trails.

2. Three indications of inadequate systems security protection Network layer security

Inadequate systems security protection is primarily aimed at outsiders attempting to gain unauthorized access to the system. It also been used to detect changes in the system's performance indicative of, for example, a virus or worm attack. Attention can then be given to damage assessment or reviewing controls that were attacked. Viruses and worms are forms of malicious code. A virus is a code segment that replicates by attaching copie...

... middle of paper ...

... let you use all the strength features mentioned here. When you get an account or change your password on a system, you should be given instructions on any limitations.

Reminding password: Pick a sentence that reminds you of the password. If you absolutely have to, record it in a secure location. It is probably safer to store a strong password in a place where someone would have to physically break in.

Safeguard Your Strong Password: Do not type your password into un-trusted, unknown, or public computers. Be careful about typing your password into a strange program, web site, or server. Use software that encrypts your password when it is sent over the network whenever possible.

Never use the same password for a risky or casual service. Do not use the same password on an unofficial, entertainment, and off-campus. Replace Your Strong password when it wears out.

More about System Access Controls

Open Document