Cyber Security Access Control In Organizations Term Paper

PAGES
4
WORDS
1346
Cite
Related Topics:

Information Technology

Access Control In Organizations

In most organizations, an access control policy is a set of rules that dictate certain people's access to specific resources. An access control policy is one of the essential security aspects an organization uses, and it's critical to have in place (Mohammed et al., 2018). It can also become cumbersome when writing multiple policies for every new risk type. Still, many tools are available that can help streamline the process and make it easier to manage.

With these tools, you will create policies quickly and easily without sacrificing their quality or quantity. Additionally, many companies need employees with different permission levels depending on their job function, so not everyone should have an admin account, especially if they don't need it. Therefore, this paper looks at how this can be ensured without compromising security or efficiency.

Access control lists (ACLs) can restrict access to objects. An ACL is typically implemented as part of a layer of security on top of authentication and encryption. Typical uses include preventing unauthorized users from accessing resources on a network, restricting access to data files, or allowing multiple users to share a resource (Sutro, 2020).

ACLs can be divided into two areas: discretionary and mandatory enforcement. Discretionary ACLs are the most common type and allow users to determine what rights they want for each object they create. For example, if a file's owner wants to give their "Group A" read permissions but denies the write permissions, only list members are given the read permission.

Discretionary ACLs can be implemented at the file system level or per user. In the former scenario, a file system may allow group A to read and write the file but deny group B. A user object could use those permissions while logged in (Sutro, 2020). Mandatory ACLs are the other type of compulsory enforcement but only allow users to assign their permissions.

If a user wants to provide access to a folder or a file, they must explicitly grant access to another user or deny it for themselves. It is beneficial for high-security needs as it prevents someone with moderate access levels from accidentally granting themselves access to higher levels that they are not authorized for. In the 1970s, Vinton Cerf and Robert Kahn developed ACLs and access control. In the 1980s, with security becoming a much more sensitive issue, RFC 1334 (Sutro, 2020) defined a new file system access control model.

Access control lists use information about users (and other user principals) to identify whether or not they are allowed access to objects. The systems that implement an ACL model will have a list of users permitted access to various system components. There are three types of ACLs: discretionary,...…to create a shared folder with permissions based on the user role. The second step would be to create an account with only read privileges over that folder. It will allow the departmental users of the organization to share documents without compromising your administrators.

The organization can implement user-based security where they allocate permissions to each user. Managing those resources will make it easier when they give different sets of rights to different users. They should assign administrators the network and system admins on the home computer; the same goes for other accounts. This division can restrict users' authority based on their account or group. An organization can revoke either an entire group's permissions or an individual account's access privileges by revoking their account access altogether (K., 2017). The security policies of the company should be documented. It will make it easier to manage documents and follow the same rules in an emergency.

In conclusion, the access control policy has helped control security risks to the organization. An access control policy is an integral part of the security management process in an organization. A well-thought-out access control policy helps establish secure network architectures; its adoption ensures that all employees have appropriate security clearances. It ensures that information is only accessible to those who need it. It illustrates a wide variety of suitable security policies for different organizations and…

Sources Used in Documents:

References

DURAISAMY, K. (2017). The Interaction Between Artificial Intelligence and Identity & Access Management: An Empirical Study. Scholar.googleusercontent.com. https://scholar.googleusercontent.com/scholar?q=cache:3mIFD7M4CKcJ:scholar.google.com/+the+concept+of+%22effective%22+privilege++in+Access+control+sytems+in+organizations+&hl=en&as_sdt=0K., L. (2017). Baltic Journal of Modern Computing, 2013, Vol.1, No.1. Scholar.googleusercontent.com. https://scholar.googleusercontent.com/scholar?q=cache:jcNGXg7OI2wJ:scholar.google.com/+Putting+passwords+on+top-level+systems++as+Access+control+sytems+in+organizations+&hl=en&as_sdt=0

Mohammed, K. H., Hassan, A., & Yusuf Mohammed, D. (2018). Identity and Access Management System: a Web-Based Approach for an Enterprise. Oer.udusok.edu.ng. http://oer.udusok.edu.ng/xmlui/handle/123456789/837Sutro, A. (2020). Machine-Learning Based Evaluation of Access Control Lists to Identify Anomalies. Defensive Publications Series. https://www.tdcommons.org/dpubs_series/2870/


Cite this Document:

"Cyber Security Access Control In Organizations" (2022, April 23) Retrieved May 4, 2024, from
https://www.paperdue.com/essay/cyber-security-access-control-organizations-term-paper-2179754

"Cyber Security Access Control In Organizations" 23 April 2022. Web.4 May. 2024. <
https://www.paperdue.com/essay/cyber-security-access-control-organizations-term-paper-2179754>

"Cyber Security Access Control In Organizations", 23 April 2022, Accessed.4 May. 2024,
https://www.paperdue.com/essay/cyber-security-access-control-organizations-term-paper-2179754

Related Documents

The operating system faced these issues due to the lackluster approach from Apple to patch their software in time. As a result, it led to risking the data of personal users. It shows that irregularities in the patching of computers affected users adversely without any fault of their own (Daily Tech, 2012). In addition to that, the operating system of Apple is now considered as one of the most favored

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware

The level and sophistication of this attack on the Department of Defense's systems suggests that professionals conducted this attack with significant resources at their disposal and an interest in the national security secrets of the United States. The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information. Since the attack, the United States responded in a number of critical ways.

Cyber Security Ethical issues associated with ransomware It is only natural that people who are known to you will send you messages through your email address. It is lost on me how those engaging in ransomware business access information about their potential victims like the email address as to send you messages that have been infected that when opened infect the whole computer. These people engage in irregular activities. For the residents