This website uses cookies to ensure you have the best experience. Learn more

The Dynamism Of Access Control Essay

2999 words - 12 pages

Heterogeneous and dynamic environments creates a need for a viable access control system in such a way that the security of data and information will be solidly ensured. Organizations have various types of resources that need access regulation. The purpose of which is to make sure that only the intended can access the resources while keeping the unauthorized person out of the loop. Even at that, hierarchy, type and the degree of task delegated to a user will determine the level of access that he or she will be granted. For example, a user with role “accountant” normally has different access rights than user with role “supervisor”. The sensitivity of resources is directly proportional to the security level mounted upon the resources and likewise the degree of access.
Many challenges are witnessed during the course of implementing access control mechanism in information security, and all of them cannot be dealt with equally. This development introduced threat to information security which consequently sets in the requirement for appropriate countermeasures in ensuring risk of losing sensitive and important data into the hands of unauthorized users are mitigated. In this paper, the role played by the access control models in dictating the path in granting or denying specific access requests will be investigated in a dynamic information security environment.
Current researches studies many methodologies and appreciations for the evaluation and implementation of protection and controls with information privacy [4]. However, since access control application is a major factor in information system security, there is a need for building a dynamic access control policy. These policies form the certificatory, regulatory and, legislator requirements to control the usage of the access rather than just anchoring the security of resources on the access control devices. This is a motivation of this paper.
Trust is an important issue in access control, considering that the access control mechanism will be handled by a personnel which could change his mind in performing opposite of the legitimate role and function he or she supposed to do. However, there are few papers that discussed about this issue of trust, knowing fully well that, the first step in securing a system or any other resources is to first regulate and monitor access to that system. To know who log in, when the login was made and, what was accessed. Micheal [3] discussed four effects of human factor in security, hiring talent with right attitude, employee and executive accountability for security practices, data governance by executive and senior management, and cyber insurance and the need to minimize liability.

The first input of this paper is to provide a detailed role played by the three most primary models of access control, discretionary access control (DAC), mandatory access control (MAC) and, role-based access control (RBAC). This information will allow us to see the technicality behind...

Find Another Essay On The Dynamism of Access Control

The Evolvement of Information Sharing and Access

1387 words - 6 pages The Evolvement of Information Sharing and Access Today, in the twenty first century, society functions through a digital media and mass production of literature. Universities function through libraries, online classes, and VPN access; medicine is made possible through the production of medical books are around the country, online access to medical research, the ability to share information with a doctor in another state; every part of

Dangers of Unlimited Access to the Internet

1035 words - 4 pages Katie Freeman-Hogan Mrs. Drummond English 10 21 May 2014 Dangers of Unlimited Access “Social media websites can enrich children’s lives, but they can also be hazardous to their mental and physical health” (Hellmich). (Social media sites) “can enhance kids’ creativity and help them develop technical skills. They can also can lead to cyberbullying, depression, and exposure to inappropriate content” (Hellmich). Even if the internet can help the

The control of Cash

1403 words - 6 pages deposit boxes. The inventory should be kept in a locked area with the monitor. The security system with the alarm associates with the police office. The cameras and monitors should be used in all stores to reduce the loss of products. This may be outsourcing from the protection service company. Setting the password for the access to the database and computer and limit the person who know the password. (Gaffikin, Michael, 1993, pg300)2.Internal control

The Botany of Control

1835 words - 8 pages It is natural to perceive the relationship between people and domesticated plants as one-sided, with humans, the subject, freely imposing its will upon plants, the object. Observers will point to the historical progress of technological innovations in agriculture that offer seemingly greater mastery over our plant counterparts and suggest that humans largely control domesticated plants; today, man seems free to choose what plants to grow

“Access to Capital Structure, and the Funding of the Firm”

1446 words - 6 pages Introduction In this essay, I will give brief review notes for “Access to Capital Structure, and the Funding of the Firm” (Omer Brav 2009) which will be focused on the goal of this easy, how and why the theoretical hypotheses are tested and what are the findings. Some discussions about data, methodology used and theory defects will also be included in this essay for critical comment. Content Objective Since earlier capital structure

Analyze the usefullness of having access to the DIPEx website

1713 words - 7 pages 'DIPEx (Database of Individual Patients' Experience of illness) is a multimedia website which launched in July 2001. It's main component is a database of patients' experiences of specific condition, supplemented by evidence-based information about the illness and treatment options and other practical information.This assignment will argue the implications of having access to the database 'DIPEx'. It will explain how the website provides sources

Cloning the Metagenome to Access the Biodiversity of Unculturable Bacteria

2153 words - 9 pages previously uncharacterized members in both bacterial and archaeal domains. The International Convention on Biological Diversity (CBD) defines biodiversity as “The variability among living organisms from all sources including, terrestrial, marine, and other aquatic ecosystems”. This variability amongst microorganisms is being studied at meta level with the help of metagenomics. Metagenomics represents a powerful tool to access the abounding biodiversity

The Most Common Types of Systems Access Controls

703 words - 3 pages The most common types of systems access controls Access control requires unique user identification, emergency access procedure, automatic log-off, and encryption and decryption of data. In order to maintain confidentiality, integrity and availability of data, it is important to control access to the information system. Controls prevent unauthorized users from accessing the system and/or altering data. They also prevent authorized users from

The Effect of Socioeconomic Status on Limited Access to Healthcare

1117 words - 4 pages What is the effect of socioeconomic status on limited access to healthcare? Socioeconomic status can limit access to healthcare in many ways. Several Americans do not have the means to receive healthcare although it is readily available to the entire population. A person’s social status, urban community and financial background can all have an impact as to how access to healthcare is achieved. While there are many factors that limit

Random Access Memory (RAM): The Genius of Memory

715 words - 3 pages processor can access them quickly.How is this data written to and stored in RAM? In the most common form of RAM, dynamic random access memory (DRAM), transistors (in this case, acting as switches) and a capacitor (as a data storage element) create a memory cell, which represents a single bit of data.Memory cells are etched onto a silicon wafer in a series of columns (bitlines) and rows (wordlines), known as an array. The intersection of a column and

The Question of Health Care Access for Children

1188 words - 5 pages State Children’s Health Insurance Program, CHIP was passed in 1997. But parents/caregivers are not taking full advantage of this. Lack of access to medical care is, without question, detrimental not only to the children but to society as well. (Sommers 2005) Why are these numbers so dismal? Are there changes in policy that could be made to improve this situation? Multiple barriers in both households as well as the provider side exist

Similar Essays

Growth Of, Control Of, And Access To The Internet

4299 words - 17 pages communication in the form of email. Information can be sent to anyone who has access to a computer and the Internet. The Internet allows people to express their feelings and emotions anonymously. However, governments have looked to control information from the Internet. This presents a battle between freedom of speech and censorship by the government. With the terror attacks of September 11, 2001, governments have increased the security in order to

Investigating The Implementation Of Magnetic Access Control Card Security System Within The Swaziland College Of Technology Community

1428 words - 6 pages 1. Introduction Access control is the restriction of access to a building or area and it can be achieved by different means of physical security. Magnetic access control card system is one of the many ways of restricting access to a building or area. According to Oke et al. (2009), magnetic access control systems are used to control entry to a room or building and were developed to reduce prodigious amount of theft and fraud. Magnetic access

Investigating The Implementation Of Magnetic Access Control Card System Security Within The Swaziland College Of Technology Community

2815 words - 12 pages 2. Introduction This chapter gives a brief description of a magnetic card access control security system. It briefly narrates a general background of the magnetic access control system. The chapter also describes the processes followed by the system from when a card is provided at the entrance until the user is logged out of the system. The components of the magnetic card access control system and the types of magnetic card access control system

Access Control Layer On Top Of Pig Using Xacml

1366 words - 5 pages authorization based on very finer details. This finer information is attributes stated in the policy. XACML also defines set of functions, which can be used in authorization logic evaluation. XACML is primarily an Attribute Based Access Control system (ABAC), But it also can be implemented for Role-based access control (RBAC) as a specialization of ABAC. In this web application, it provides role based access control using XACML policies generated