It 244 Appendix F

713 Words3 Pages
Associate Level Material Appendix F Access Control Policy Student Name: University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Date: Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on. Access Control Authentication is used to verify that the user is the only authorized user that should be on that device or system. It is also used to know who is trying to access data, what they are allowed to access and where they are trying to access it from. There are multiple ways in which this can be done. There are a few different types of authentications. The first is the user and the password. A person creates a user name and a password that they only know. Another form of authentication is a multifactor this is where a user will have a user name and a password and then will be asked a question that only they will know. This adds another level of security for the user. The last form is a biometric method. This method uses a fingerprint, eye scan or signature to verify that this person is who they say they are. Each and every one of these method only increase your level of security and make it harder for a criminal to gain access to your system. Access control strategy Discretionary access control Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to

More about It 244 Appendix F

Open Document