Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: August 21st, 2022

Access Controls Questions

Computer Sciences and Information Technology Access Controls Questions
Access controls are security features that control how users and systems communicate and interact with other systems and resources.
Directions: In a two- to three-page paper in APA format, discuss the importance of security access controls. Be sure to include responses to the following questions:
Why are access controls such as firewalls, VPNs, security configurations, and ACLs important?
How do these security access controls work together?
What challenges do access controls create?
How do we overcome these challenges during the security architecture or design phase?
Support your choices using scholarly journals and credible sources.

Access Controls Questions
Discuss the importance of security access controls?
The security access controls have great advantages in securing and safeguarding the logical and physical systems. First, the security access control enables the system and networks to conduct authorization and authentication to entities and users by accessing and evaluating their identification numbers, passwords, security tokens, biometric scans, and other authentication factors thus ensuring only authorized parties access the systems (Pearson and Benameur, 2010). Consequently, security access controls evaluate the operations and activities taking place within a network or security. In this regard, the security access control identifies the parties and individuals by verifying their applications, authorizing access levels and evaluating the set of actions associated with different parties or their IP addresses.
Why are access controls such as firewalls, VPNs, security configurations, and ACLs important?
The ACLs, security configurations, VPNs and firewalls have different benefits in regulating access to systems and networks. In this regard, the access controls act as deterrence criminal operations and protection from theft. The access controls are effective in averting burglary, theft, and vandalism by adopting different precautionary measures (Pearson and Benameur, 2010). The system monitors the activities in the system making it easy to detect and prevent criminal operations. Furthermore, access control plays a vital role in protecting members of staff thus increasing employee safety. The access controls make it possible to regulate people’s access to places of work thus providing a safe working environment.

How do these security access controls work together?
The security access control operates by authentication information using access control devices using information held by the potential users such as PIN, pass-phrase and password, something the user has such as smart card or key and something the user is such as fingerprint and facial recognition (Bellovin and Bush, 2009). In this case, the different access control thus conducts the authorization and authentication of the entities and users by evaluating the login credentials such as security tokens, biometric scans, personal identification numbers, passwords, and other authentication factors. The multifactor authentication requires different authentication factors to provide a multilayered defense in the course of protecting networks and systems. The different access control identifies the person accessing the system or a network by the verification of the applications or the person the later authorizes the access level and set of actions related to the IP address and username. All the access control work hand in hand to regulate and minimize the risk of unauthorized access to logical or physical systems.
What challenges do access controls create?
Different challenges arise from the use of access controls thus compromising or endangering the security of systems or networks. The access controls are affected by the challenges of inconsistency making it hard to effectively protect data within a system (Bauer et al., 2009). The inconsistencies arise in the implementation affecting the manner data is transported within an organization through mobile wi-fi, servers and cloud storage thus compromising the security of an organization. On the other hand, access controls have the challenge of inflexibility such that it cannot adapt to the changing technology thus making it hard to handle increase insecurity and risks.
How do we overcome these challenges during the security architecture or design phase?
The access control security architecture needs to have detection mechanisms that alert the relevant parties if there are challenges or issues experienced such as the inconsistency and insecurity issues this fact ensures that problems can be effectively handled (Kim et al., 2010). On the other hand, the design architecture needs to ensure that the system is flexible to enable it to adapt to changes.

References
Bauer, L., Cranor, L. F., Reeder, R. W., Reiter, M. K., & Vaniea, K. (2009, April). Real life challenges in access-control management. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 899-908). ACM.
Bellovin, S. M., & Bush, R. (2009). Configuration management and security. IEEE Journal on Selected Areas in Communications, 27(3), 268-274.
Kim, T. H. J., Bauer, L., Newsome, J., Perrig, A., & Walker, J. (2010, August). Challenges in Access Right Assignment for Secure Home Networks. In HotSec.
Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from cloud computing. In 2010 IEEE Second International Conference on Cloud Computing Technology and Science (pp. 693-702). IEEE.

Order | Check Discount

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00