University of Maryland Global Campus Computer Security Paper
Question Description
1. Access controls are security features that are usually considered the firstline of defense in asset protection. They are used to dictate how subjectsaccess objects, and their main goal is to protect the objects fromunauthorized access. Access control models are frameworks that use accesscontrols to enforce the rules and objectives of the model. In your essayresponse, compare the different Access Control Models and give anexample of one that you have used in a work situation or if that is notpossible, one that youve read about in a scholarly article.2. Relying on a password to secure access to a system does not provideenough security in todays complex world. The Office of PersonnelManagement learned this the hard way in 2015. Since OPM was hackedand it was learned that the attackers compromised their systemadministrator accounts that were protected only with passwords, theFederal government has required the use of multifactor authentication forprivileged accounts. Describe the three factors that can be used inauthentication and give at least two examples for each.3. There are two main methods of access control administration that anorganization can choose between to achieve the level of protection thatthey need to secure their assets and information: centralized anddecentralized. Describe the RADIUS, TACACS, and DIAMETER forms ofcentralized access control administration. What are the advantages anddisadvantages of decentralized administration.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."