Week 4 Written Assignment
Shravya Errabelly
Discuss security and technical drivers for having an access control policy and the fundamental tenets of that policy.
An access control policy outlines the controls sited on physical access to the computer system and the software to limit computer networks and data access. The access control policy offers facts on controlling access to systems and information. An access control policy should be able to protect data effectively (Qi & Kudo, 2015). Access control policies are high-level needs that stipulate how access is accomplished and who may access info under what situations. The technical and security drivers for having an access control policy are discussed below.
An access control policy helps in minimizing the risk of authorized access to the computer and physical systems, which thus leads to the formation of a foundational part of data, information, and network security. the employment of authentication method, ensures that there is a verification of an individual who claims to be the one. The authorization method helps determine if the user should access the data (Custance, 2015). Without the two methods that is authorization and authentication, there is no data security. The main aim of access control is to offer convenient and quick access to the individuals who are authorized and at the same time restricting access to unauthorized individuals.
The access control policy’s central tenets are that access control is a security method regulating what and who can employ or view resources in a computing surrounding. Access control needs to be enforced. Access control can adapt a sophisticated access control policy dynamically to respond to the evolving risk factors. Organizations should ensure that their access control technologies are supported consistently via their cloud applications and assets. Access control policy ensures that the access control rules change based on the risk factor (Huang & Tellambura, 2015).
References
Custance, N. (2015). Technical access control systems. Turning policy into practice. Proceedings IEEE 31st Annual 1997 International Carnahan Conference on Security Technology. doi:10.1109/ccst.1997.626239
Huang, X., & Tellambura, C. (2015). A contention channel access control policy- retreatable dual mean collision density control policy (REDME) for random channel access control. VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026). doi:10.1109/votes.2000.851448
Qi, N., & Kudo, M. (2015). Access control policy languages in XML. Handbook of Database Security, 55-71. doi:10.1007/978-0-387-48533-1_3