Access Control Policy

In: Computers and Technology

Submitted By mrwaller44
Words 526
Pages 3
Associate Level Material
Appendix F

Access Control Policy

Student Name: Christopher Waller

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Romel Llarena

Date: May 13, 2012

Access Control Policy

Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems

1 Authentication

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Authentication credentials really help control access to sensitive data or systems by making it literally to get unauthorized access to them. Passwords and usernames are a good way to start because if you use those rights then these are hard to bypass, but multifactor authentication is a more efficient way for secure access. Triple authentication requires something you have, something you know, and something you are such as a keycard, password and a fingerprint.

2 Access control strategy

1 Discretionary access control

Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to dictate access to that information.

The principle of least privilege helps keep all important files and document kept confidential and accessed by those who have the proper authority to access them. This normally follows a chain of command and whoever is lower on that chain will have less access than those higher in command. This means that the CEO or owner of the company, under…...

Similar Documents

Richman Investments Remote Access Control Policy

...also known as the syntax layer, it translates each computers syntax into a common transfer syntax so that it can be read by the other computer on the network it also provides file compression and encryption. It lets the computers on the network talk to each other • Session Layer 5- This layer establishes, manages and terminates connections between applications, this layer sets up, coordinates and terminates conversations at each end. It puts all the data together to make the connection needed to make these exchanges • Transport layer 4-“This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer” (Webopedia) this layer makes sure that the message stays intact and also handles flow control to ensure a smooth flow of traffic from end to end traffic. • Network Layer 3 –This layer deals with creating a logical path for transmitting data from computer to computer through routers and switches. It manages addressing ,internetworking , congestion, and error handling also puts segments into packets • Data Layer 2- This layer assigns the appropriate protocol to the data and the type of network and packet sequence is defined • Physical Layer 1-This is the layer that handles the actual hardware, this means the network connections voltage levels and timing ......

Words: 606 - Pages: 3

Access Control Policy

...purpose of this policy is to define standards for connecting to 's network from any host. These standards are designed to minimize the potential exposure to from damages which may result from unauthorized use of resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical internal systems, etc. 2.0 Scope This policy applies to all employees, contractors, vendors and agents with a -owned or personally-owned computer or workstation used to connect to the network. This policy applies to remote access connections used to do work on behalf of , including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of employees, contractors, vendors and agents with remote access privileges to 's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to . 2. General access to the Internet for recreational use by immediate household members through the Network on personal computers is permitted for employees that have flat-rate services. The employee is responsible to ensure the family member does not violate any policies, does not perform illegal activities, and does not use the access for......

Words: 1119 - Pages: 5

Richman Investment Remote Access Control Policy

...Richman Investment Richman Investment Remote Access Control Policy Document Remote Access Control Policy Document 01/14/14 01/14/14 Contents 1 Policy Statement 4 2 Purpose 4 3 Scope 4 4 Definition 4 5 Risks 4 6 Applying the Policy - Passwords 5 6.1 Choosing Passwords 5 6.1.1 Weak and strong passwords 5 6.2 Protecting Passwords 5 6.3 Changing Passwords 5 6.4 System Administration Standards 6 7 Applying the Policy – Employee Access 6 7.1 User Access Management 6 7.2 User Registration 6 7.3 User Responsibilities 6 7.4 Network Access Control 7 7.5 User Authentication for External Connections 7 7.6 Supplier’s Remote Access to the Council Network 7 7.7 Operating System Access Control 7 7.8 Application and Information Access 8 8 Policy Compliance 8 9 Policy Governance 8 10 Review and Revision 9 11 References 9 12 Key Messages 9 13 Appendix 1 10 Policy Statement Richman Investments will establish specific requirements for protecting information and information systems against unauthorised access. Richman Investments will effectively communicate the need for information and information system access control. Purpose Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of Richman Investments which must be managed with care. All information has a value to the Council. However, not all of this information has an......

Words: 2211 - Pages: 9

Remote Access Control Policy Definition

...Remote Access Control Policy Definition Introduction to Information Security Remote access is the ability to log onto a network from a distant location. Generally, this implies a computer, a modem, and some remote access software to connect to the network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer actually becomes a full-fledged host on the network. The remote access software dials in directly to the network server. The only difference between a remote host and workstations connected directly to the network is slower data transfer speeds. The purpose of a remote access policy is to define the standard connection to the company’s network from any remote host, untrusted host and remote network, including untrusted hosts on the company’s intranet. These standards are designed to minimize the potential exposure to the company’s from damages, which may result from unauthorized use of the company’s resources. At the main location, a set switches and routers are interconnected to from a Wide Area Network. The switches can be connected in different topologies. All remote users must follow the security requirements set forth in the standard for the company’s remote host accessing Information Technology Resources prior to such access, as well as any guidelines, procedures or other requirements issued by the Information Technology Department. Within the virtual private network multiple Virtual Private Network......

Words: 660 - Pages: 3

Remote Access Control Policy for Richman Investments

...Remote Access Control Policy for Richman Investments 1.0 Overview This remote access policy defines standards for connecting to the organizational network and security standards for computers that are allowed to connect to the organizational network. This remote access policy specifies how remote users can connect to the main organizational network and the requirements for each of their systems before they are allowed to connect. This will specify: 1. The anti-virus program remote users must use and how often it must be updated. 2. What personal firewalls they are required to run. 3. Other protection against spyware or other malware. The remote access policy defines the methods users can use to connect remotely such as dial up or VPN. It will specify how the dial up will work such as whether the system will call the remote user back, and the authentication method. If using VPN, the VPN protocols used will be defined. Methods to deal with attacks should be considered in the design of the VPN system. 2.0 Purpose The purpose of this policy is to define standards for connecting to department’s network from any host. These standards are designed to minimize the potential exposure to department from damages that may result from unauthorized use of department resources. Damages include the loss of sensitive or confidential data, intellectual property, damage to public image, damage to critical internal systems, etc. 3.0 Scope This policy applies......

Words: 1336 - Pages: 6

Remote Access Control Policy Definition

...The following are types of Remote Access Control Policy I would like to put into place to make sure our company’s data is secure. We need to get the right security measures so the correct people can have access to the data they need to do their job. I would start by setting up a Remote Authentication Dial-In User Service (RADIUS), a VPN, Firewall, Local Biometrics, RSA – F.O.B. by using a security key carried by the employee or set it up on the local server. I would start in the Main office that is located in Phoenix, AZ by install a RADUIS, this is a client/server protocol that runs in the application layer and will connect all the employee and visitor to the server. In the main office, we need to set up a database with all username and passwords for the employees’. At all the satellite facilities, we need to set up the proper VPN, Firewall protection as well as setting up some type of biometric logon system or a random number generator where a user will be given a security key and they will need to input that when they log on to the system. We need to set up the password system to reset every 3 months and set up a password remembrance. For the mobile devices that the sales department will need, I would suggest to encrypt the local hard drives if stolen and set up biometric thumb scanner as well as a security key require to log on to their systems....

Words: 261 - Pages: 2

Remote Access Control Policy

...Remote Access Control Policy Definition What is remote access? Remote access is the ability to log onto a network from a distant location. What that means that a computer, a modem, and some kind of remote access software is required to connect to the network. But remote control refers to actually taking control of another computer, whereas remote access means that the remote computer has the ability to become a hot on the network. When you use remote access software it will directly dial into the network server. There is a difference between a remote host and workstations that are connected directly to the network is the slower data transfer speeds. What the purpose behind a remote access policy is to define the standard hosts on the company’s intranet from the remote host, non-trusted hosts (on the company’s intranet too), and remote network. These standards are setup to minimize any potential exposure to the company’s network and data from any damages, which are a result of unauthorized access by attackers through the network, virus, software, and more. When it comes to the main location of the company, it will have a Wide Area Network (WAN), along with the WAN there will be a set of switches and routers connected to and from the WAN. This allows for the switches to be connected to different topologies. A Virtual Private Network (VPN) will be created using Internet Protocol (IP) by the company’s IT department. Within the VPN there will be other VPN routers will......

Words: 889 - Pages: 4

Simple Access Control Policy

...1. Purpose This policy establishes the Access Control Policy for <Company>. <COMPANY> implements access controls across its networks, systems, and services in order to provide appropriate user access while ensuring proper security of data confidentiality, integrity, and availability. Human threats are the primary cause for a wide range of hazards to business systems and information. For this reason, access controls must be put in place to mitigate any possible threat. 2. Scope and Applicability The scope of this policy applies to all Information Technology resources owned and/or operated by <Company>. Any information not specifically identified as the property of other parties that is transmitted or stored on <COMPANY> IT resources is the property of <COMPANY>. All users, including <COMPANY> employees, contractors, vendors or others) of IT resources are held accountable for upholding this policy. The <COMPANY> external website and information contained within it is regarded as “Public” information, and is available to anyone inside or outside the company. 3. Standards Each user provided access to <Company> systems and data is provided this access on a least privilege and need-to-know basis. The corporation will use a combination of role-based access control, mandatory access control, and/or discretionary access control as appropriate in order to safeguard sensitive information. 4. Policy 4.1......

Words: 993 - Pages: 4

Remote Access Control Policy

...Remote Access Control Policy The Remote Access Control Policy for Richman Investments is designed to protect the confidentiality and integrity of our corporate and customer information. All remote sessions, including internal wireless access will utilize PKI certificates from a public trusted third party vendor using encrypted tunnels on the Internet. Site-to-Site data exchanges will be conducted using IPSec encrypted Tunnels. Customer Remote Access These Connections must allow the customer to securely exchange information with our Web Server applications. The Web Servers will be place on the Corporate DMZ and the Database Servers on the interior corporate LAN. Web to Database traffic will be encrypted. The Web Servers will have PKI certificates from a trusted third party vendor to eliminate spoofing. Data will be encrypted using SSL connections initiated on the customer’s Browser to maintain confidentiality. The customer will need to supply a username and password which the Web browser will pass to a RADIUS Server for Authentication, and Access permissions prior to granting access to protected areas of the Website. Employee Access All Employee Connections, internal and external, to the Internal LAN at all sites will utilize Two Party Authentication to minimize the risks of utilizing passwords as the primary access method. Employees will have a employees will have a onetime pass key generating token (Ex. RSA) and PIN in addition to their Username and Password to......

Words: 510 - Pages: 3

Remote Access Control Policy Definition

...Remote access security policy involves the policies and conditions that are in place that allow users to connect to servers when out of the network. In the case of Richman industries, they are interested in maintaining connections with their users, and sharing app data that is on a server for their day to day operations. In their case, I would have access policy that is based on Explicit Allow policies. This means that the policy grants “Permission” to access the servers remotely if the connection attempt matches the policy conditions. Some of the requirements would include strict control enforced via one-time password authentication or public keys with strong pass-phrases. Also, anyone trying to gain access must not be connected to any other network at the same time, aside from personal home networks under the user's complete control. Further, employees with access must not use email accounts other than the company's standards, so that personal use won't be confused with business. Users must have approved virus control and spyware protection in place on all devices accessing the company network. Remote access will be limited in certain areas, while at least Applications will be approved for access (Shared application data is an important part of Richman’s network). Systems and system settings will not be accessible from remote, out of network connections, to protect from outside alterations of systems or system settings, and any Data access will be read only, with......

Words: 300 - Pages: 2

Access Control Policy

...F Access Control Policy Student Name: Charles Williams University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Tarik Lles Date: December 4, 2011 Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems Access control is used to restrict operations, which authorized users can perform. Access control does exactly what it says, it controls what access an authorized user can have. A reference monitor is used for access control and follows instructions from an authorization database. These authorizations are controlled and administered by a security administrator who sets the access controls based on the companies’ security policies, which are defined by the organization. The decision of which access controls to use would be based on the organizational policy and two accepted standards of practice, which includes separation of duties and least privilege (Kurzban, 2011). 1 Authentication Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on. Today, when using a computer system, a number of computer services are provided to many users simultaneously, so it is important to ensure that authorized users will be granted access to......

Words: 1663 - Pages: 7

Remote Access Control Policy Paper

...Night Class Remote Access Control Policy To begin designing a remote access control policy for The Richman Company, several configurations must take place. First, I would begin with the Explicit allow The remote access policy is set to "Grant remote access permission" and the connection attempt matches the policy conditions. Secondly, I would enforce The Explicit deny policy. The remote access policy is set to "Deny remote access permission" and the connection attempt matches the policy conditions. Lastly I would implement The Implicit deny policy; in case The connection attempt does not match any remote access policy conditions. After implementation of several security policies, I would create a SSL VPN network. This is a form of VPN that can be used with a standard Web browser. In contrast to the traditional Internet Protocol Security (IPsec) VPN, an SSL VPN does not require the installation of specialized client software on the end user's computer. It's used to give remote users with access to Web applications, client/server applications and internal network connections. Every Richman Employee must meet the Policy Conditions to the properties of the connection attempt made by the remote access client. There can be one or more Remote Access conditions applied to a single Remote Access Policy. More Importantly, Every employee must also meet Remote Access Permissions. If all the conditions for a Remote Access Policy are met, then Remote Access Permission is either......

Words: 392 - Pages: 2

Access Control Policy

...Overview Nelleo Networking and Technology main focuses is to prevent unauthorized access to all available resources, data computers and information systems on the network. Every employee and supporting staff that has a User name and password to the organizations network must follow this policy Purpose Malicious attacks from hackers are common on the network. Therefore it is up every employee and supporting staff to help protect the network and its resources, including data, from unauthorized access. Scope This policy was created to insure that the company stays in adherence to governmental laws that requires the organization to protect vital information that may be damaging to its employees and customers. Access Control • Allow employees and supporting staff will submit a request to the IT Department for access to the network. The requester will have his/her supervisor and manager sign off on the request listing all of the resources the employee will need access to. • Once the employee receives the approval for a user account, the employee will then come to the IT department where they will receive a CAC card for access to the network. • Upon logging in for the first time the employee will be require to change his/her password in accordance with the Password Policy. UserID Obligations • At no given time will you give your CAC card to another employee. This will be considered a violation and a dispensary action will be taken. • Your CAC card also......

Words: 451 - Pages: 2

Richman Investments Remote Access Control Policy

... 2) User Domain   a. Use security awareness training to instruct employees of Richman Investments security policies.   b. Audit user activity. 3) Workstation Domain   a. The usage of antivirus and anti malware programs on each user computer.   b. Implement strict access privileges to corporate data.   c. Deactivation of media ports. 4) LAN Domain   a. Utilizing network switches.   b. Utilize encryption to wireless access points.   c. Secure server rooms from unauthorized access.   5) LAN to WAN Domain   a. Closing off unused ports via a firewall to reduce the chance of unwanted network access.   b. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. c. Run all networking hardware with up to date security patches, and operating systems. 6) WAN Domain   a. Enforce encryption, and VPN tunneling for remote connections.   b. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks.   c. Enforce anti virus scanning of email attachments.   d. Isolate malicious software (virus, Trojans, etc.) when found.   e. Deployment of redundant internet connections to maximize availability.  7) Remote Access Domain   a. Establish strict user password policies, as well as lockout policies to defend against brute force attacks.   b. Require the use of authorization tokens, have a real-time lockout......

Words: 280 - Pages: 2

Remote Access Control Policy for Richman Investments

...Authorization- Richman Investments must define rules as to who has access to which computer and network resources. My suggestion is that RI implements either a group membership policy or an authority-level policy to achieve this. Group policy would allow the administrator to assign different privileges to different groups. The admin would then assign different individual users to those different groups. So the users permissions would depend on the permissions of the group they were a member of. With authority-level policy the admin would assign different permissions to individual users based on their position and authority level within the company and what access that position requires. Identification- Richman Investments needs to assign a unique identifier to each user in order to have accurate records of who is accessing, or trying to access, what applications, which network resource, and what data. The most common ID is the username, account number, or PIN Authentication- In order to keep the remote access to Richman Investments secure, there must be proof that the person trying to gain access to the network remotely is the same person who has been granted access by identification. To do this RI can choose one of the following knowledge type authentications: PIN, password, or passphrase along with one of the following ownership type of authentication: smart card, key, badge, or token. Using a combination of ownership authentication and knowledge authentication...

Words: 298 - Pages: 2