Business > CASE STUDY > ISSC680 ProjectProposal.docx ISSC680 Project Proposal ISSC680 Project Proposal Acces (All)
ISSC680 ProjectProposal.docx ISSC680 Project Proposal ISSC680 Project Proposal Access control is the basis of my project proposal. Access control in its most basic definition is something that ... œconstrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do (Sandhu & Samarati, 1994). It is this concept that has a wide reaching variety of methodologies and tools that can be used. Access controls are normally broken down into three groups: preventative, detective, and corrective. Within each of these groups are subcategories of types, such as physical, administrative, and technical. When each group and type is used in conjunction with each other, a layered defense is created to protect an asset; this is also referred to as œdefense-in-depth (Peltier, 2013, p. 205). The primary problem that access control looks to combat is that of unauthorized access t. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 3 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 22, 2021
Number of pages
3
Written in
This document has been written for:
Uploaded
Jul 22, 2021
Downloads
0
Views
57
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·