Case study on access control


Case Study:

Question 1:

"Access Control"

Answer the following:

If you were going to design an access system that would control people getting into your favorite or most valued items, what things would you consider based on your readings ? Make sure you address all the possible avenues of attack that could be exploited. Remember, security measures are designed to slow and draw attention to attackers. No system can completely prevent successful attack.
Comment for classmate discussion:

1. If I had to design a system to protect my valuable information some things I would consider would be using strategies for my preventive controls. I would have to set up firewalls, security measures and steps to ensure that hackers could not easily access my information. I would also stay away from weak or predictive cognitive \ passwords and make sure I created a password that were significantly hard to break. Hackers aim at Rainbow table attacks and password attacks because they know most people like to use simple information, like moms maidens name and a date of birth or a location.

2. I would also identify my assets and know which assets were more likely to be targeted. If I know what is likely to be targeted first, I could work on building that area first and make it more secure. Sniffer attacks over my network could also be a possibility. I would only have a secure network and make sure not just anyone could access my network. Junk emails would not be opened also, email spoofing is a great way to target unsuspecting targets.

 

Solution Preview :

Prepared by a verified Expert
Business Management: Case study on access control
Reference No:- TGS01785928

Now Priced at $30 (50% Discount)

Recommended (96%)

Rated (4.8/5)