The Dynamism Of Access Control Essay

2999 words - 12 pages

Heterogeneous and dynamic environments creates a need for a viable access control system in such a way that the security of data and information will be solidly ensured. Organizations have various types of resources that need access regulation. The purpose of which is to make sure that only the intended can access the resources while keeping the unauthorized person out of the loop. Even at that, hierarchy, type and the degree of task delegated to a user will determine the level of access that he or she will be granted. For example, a user with role “accountant” normally has different access rights than user with role “supervisor”. The sensitivity of resources is directly proportional to the security level mounted upon the resources and likewise the degree of access.
Many challenges are witnessed during the course of implementing access control mechanism in information security, and all of them cannot be dealt with equally. This development introduced threat to information security which consequently sets in the requirement for appropriate countermeasures in ensuring risk of losing sensitive and important data into the hands of unauthorized users are mitigated. In this paper, the role played by the access control models in dictating the path in granting or denying specific access requests will be investigated in a dynamic information security environment.
Current researches studies many methodologies and appreciations for the evaluation and implementation of protection and controls with information privacy [4]. However, since access control application is a major factor in information system security, there is a need for building a dynamic access control policy. These policies form the certificatory, regulatory and, legislator requirements to control the usage of the access rather than just anchoring the security of resources on the access control devices. This is a motivation of this paper.
Trust is an important issue in access control, considering that the access control mechanism will be handled by a personnel which could change his mind in performing opposite of the legitimate role and function he or she supposed to do. However, there are few papers that discussed about this issue of trust, knowing fully well that, the first step in securing a system or any other resources is to first regulate and monitor access to that system. To know who log in, when the login was made and, what was accessed. Micheal [3] discussed four effects of human factor in security, hiring talent with right attitude, employee and executive accountability for security practices, data governance by executive and senior management, and cyber insurance and the need to minimize liability.

The first input of this paper is to provide a detailed role played by the three most primary models of access control, discretionary access control (DAC), mandatory access control (MAC) and, role-based access control (RBAC). This information will allow us to see the technicality behind...

Find Another Essay On The Dynamism of Access Control

The control of Cash Essay

1403 words - 6 pages deposit boxes. The inventory should be kept in a locked area with the monitor. The security system with the alarm associates with the police office. The cameras and monitors should be used in all stores to reduce the loss of products. This may be outsourcing from the protection service company. Setting the password for the access to the database and computer and limit the person who know the password. (Gaffikin, Michael, 1993, pg300)2.Internal control

“Access to Capital Structure, and the Funding of the Firm”

1446 words - 6 pages Introduction In this essay, I will give brief review notes for “Access to Capital Structure, and the Funding of the Firm” (Omer Brav 2009) which will be focused on the goal of this easy, how and why the theoretical hypotheses are tested and what are the findings. Some discussions about data, methodology used and theory defects will also be included in this essay for critical comment. Content Objective Since earlier capital structure

The Botany of Control

1835 words - 8 pages It is natural to perceive the relationship between people and domesticated plants as one-sided, with humans, the subject, freely imposing its will upon plants, the object. Observers will point to the historical progress of technological innovations in agriculture that offer seemingly greater mastery over our plant counterparts and suggest that humans largely control domesticated plants; today, man seems free to choose what plants to grow

Analyze the usefullness of having access to the DIPEx website.

1713 words - 7 pages 'DIPEx (Database of Individual Patients' Experience of illness) is a multimedia website which launched in July 2001. It's main component is a database of patients' experiences of specific condition, supplemented by evidence-based information about the illness and treatment options and other practical information.This assignment will argue the implications of having access to the database 'DIPEx'. It will explain how the website provides sources

The Most Common Types of Systems Access Controls

703 words - 3 pages The most common types of systems access controls Access control requires unique user identification, emergency access procedure, automatic log-off, and encryption and decryption of data. In order to maintain confidentiality, integrity and availability of data, it is important to control access to the information system. Controls prevent unauthorized users from accessing the system and/or altering data. They also prevent authorized users from

The Effect of Socioeconomic Status on Limited Access to Healthcare

1117 words - 4 pages What is the effect of socioeconomic status on limited access to healthcare? Socioeconomic status can limit access to healthcare in many ways. Several Americans do not have the means to receive healthcare although it is readily available to the entire population. A person’s social status, urban community and financial background can all have an impact as to how access to healthcare is achieved. While there are many factors that limit

Random Access Memory (RAM): The Genius of Memory

715 words - 3 pages processor can access them quickly.How is this data written to and stored in RAM? In the most common form of RAM, dynamic random access memory (DRAM), transistors (in this case, acting as switches) and a capacitor (as a data storage element) create a memory cell, which represents a single bit of data.Memory cells are etched onto a silicon wafer in a series of columns (bitlines) and rows (wordlines), known as an array. The intersection of a column and

Access the impacts of globalisation in our business world

518 words - 2 pages volatility and speculation.Investment growth. FDI grew seven fold between 1990-2000. Fell to US$560 billion in 2003 due to economic slowdown. Reflecting interdependence between developing and developed.TNC's doubled from 37,000 to 60,000. Expansion of other features extending beyond national boundaries.Advocates - best opportunity for growth, specialisation, allocative efficiency, greater access to technology, labour and increased living

The Control of The Television

1870 words - 7 pages Kathy Banks Professor Kalloniatis ENGL 1101, Section BBB 12 October 2002 The Control of Television What is the first thing we normally do when we walk in the door? Set our keys down, kick off our shoes, and turn on the television. It seems that today?s society has become more and more dependant upon the magical little box that sits in our living rooms, as well as many other rooms in the house. It is startling to realize how much of our lives

The necessity of gun control.

972 words - 4 pages Gun Control versus Easy Access Of Firearms Introduction Individual ownership of guns should be strictly supervised via gun control as this may reduce gun violence. Adults can kill each other in a moment of great anger. Young children have been known to have accidentally found their parents' gun with fatal consequences. Criminals will not be discouraged from using guns without stricter regulations. Guns, are far more lethal than knives or

The Ethics of Rent Control

1150 words - 5 pages Ethics, according to the Oxford dictionary is “a set of moral principles that govern a person’s behavior or the conducting of an activity”. Ethics consists of doing what the law requires, following the standards of behavior our society accepts, and also has to do with what you believe is right or wrong. Rent control is not unethical, but is very controversial. If on one hand it is a good thing because it prevent landlord from being unethical

Similar Essays

Growth Of, Control Of, And Access To The Internet

4299 words - 17 pages communication in the form of email. Information can be sent to anyone who has access to a computer and the Internet. The Internet allows people to express their feelings and emotions anonymously. However, governments have looked to control information from the Internet. This presents a battle between freedom of speech and censorship by the government. With the terror attacks of September 11, 2001, governments have increased the security in order to

Access Control Layer On Top Of Pig Using Xacml

1366 words - 5 pages authorization based on very finer details. This finer information is attributes stated in the policy. XACML also defines set of functions, which can be used in authorization logic evaluation. XACML is primarily an Attribute Based Access Control system (ABAC), But it also can be implemented for Role-based access control (RBAC) as a specialization of ABAC. In this web application, it provides role based access control using XACML policies generated

Investigating The Implementation Of Magnetic Access Control Card Security System Within The Swaziland College Of Technology Community

1428 words - 6 pages 1. Introduction Access control is the restriction of access to a building or area and it can be achieved by different means of physical security. Magnetic access control card system is one of the many ways of restricting access to a building or area. According to Oke et al. (2009), magnetic access control systems are used to control entry to a room or building and were developed to reduce prodigious amount of theft and fraud. Magnetic access

The Evolvement Of Information Sharing And Access

1387 words - 6 pages The Evolvement of Information Sharing and Access Today, in the twenty first century, society functions through a digital media and mass production of literature. Universities function through libraries, online classes, and VPN access; medicine is made possible through the production of medical books are around the country, online access to medical research, the ability to share information with a doctor in another state; every part of