Logical Access Control Research Paper

Great Essays
Logical Access Control
Introduction
The purpose of logical access control is to manage access to information in a way that:
System is protected from unauthorized access
Accidental damage from authorized user is minimized
All Users have access to appropriate resources.
The confidentiality and integrity of information in ABC Company are kept.
This section addresses the logical access control requirements for All Users, and all assets of ABC Company, which include but are not limited to network devices such as router, switches, and computers, properties such as office and computer room.
Audit requirements are also addressed in this section.
Authentication and Password
All Users shall be held accountable for every action carried out by his/her
…show more content…
Non-standard access may be granted in exceptional circumstances that shall be subjected to special authorization and controlled and applied only for a limited time.
Business Owners shall conduct review at regular intervals to review user access rights with allocated by system managers.

User Access Control
For access to ABC systems that contain personal user data, All Users shall sign the confidentiality agreement to abide by the Data Protection Policy before they are registered
All Users shall have their personal User ID and password pair for the system. User ID and password shall not be shared.
Group ID should only be used with approval from Director of Information Technology
Whenever Generic ID is re-assigned, the password shall be changed
There shall be a formal user registration and de-registration procedure in place for granting and revoking access to all information systems and services.
Management shall review user’s access rights every six months or when major changes are made to the IT system.
The allocation and use of privileges shall be restricted and controlled.
Password
All Users shall ensure password confidentiality and prevent disclosure and compromise at all
…show more content…
All Users shall have a unique User ID such that activities can be traced to responsible user.
Periodically, it is necessary to change the Operating System (including upgrade to newer version). When such changes occur the security of the system should be reviewed to ensure that it does not introduced any vulnerability.
For systems that have single administrative accounts, such as Unix, users with access to the administrative account must first use their normal account to log into systems before switching to the privileged administrative account. This is to identify and log the user of the administrative accounts.
Users given command line access to systems must, where feasible, be limited to the access or service needed via the use of restricted shells, application menu restrictions or other means.
Super user/administrator accounts should not be used for daily operations and should be kept secure until required for emergency use. Operators should be provided with accounts with reduced privileges for their daily operational activities whenever the system

Related Documents

  • Decent Essays

    7. Application Access Control Access to programming, framework utilities and project source libraries might be controlled and confined to those approved clients who have a sensible industry need frameworks or database administrators. Approval to utilize an application might rely on upon the accessibility of a permit from the supplier. Give security from unapproved access by any utility, OS software, and malicious programming that is equipped for bypassing framework or application controls.…

    • 118 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Lab #5: Introduction to Metasploit on Kali Linux Team: CRYPTERS 1 d. Why is it usually a bad idea to operate in the Linux environment as root? If you are unfamiliar with the concept of the root user, do a quick google search. It is always a good practice on any operating system to run your applications on a user level and leave the administrative tasks to the root user, and only on a per-need basis. Applications are meant to be run by users with non-administrative privileges.(Power December 4, 2010)…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    It offers security by password technique for individual access, and protect against unauthenticated change and delicacy. High maintenance as frequent changes is instantly distributed. All changes and implementation are built on-sever. Encourage interaction and communication through java and needs Browser capable of running JAVA programs.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Industry Example DoD industry partners follow stringent change control processes for configuration management minimizing risk to the government. CISCO, an important industry partner not only implements a CM program for themselves they share their processes and methods as another business offering. Assess and Evaluate the RFC The potential impact to services and service assets and configurations needs to be fully considered prior to the change. Generic questions (such as the "seven Rs") provide a good starting point.…

    • 1234 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Logical security : Logical security consists of software safeguards for an organization's systems including user identification and password access, authentication, access rights and authority levels. These measures are to ensure that only authorized users are able to perform actions or access information in a network. Access control mechanism: As part of access control mechanism we are using MAC (mandatory access control mechanism) where users do not enjoy the privileges of deciding who can access their files. Here the operating system is the decision maker overriding the user’s wishes.…

    • 345 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    These threats can come in many forms, users can get viruses on their computer or an actual person can hack into the user’s account. A user who wants the best protection will need to keep the choice of operating system in mind.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In 1996, United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) as a way for Americans to continue with health care insurance during a job transition and reduce health care fraud and abuse (California Department of Health Care Services, 2015). Providing health care services at the administrative level, the organization is responsible for protecting the individuals served private information when working with other health care providers and those supporting the individual needs. In this analysis the origins and impact of HIPAA/Private Health Information (PHI) while serving individuals with Intellectual Developmental Disabilities will be discussed, along with Bardach’s eightfold process of HIPPA/PHI and…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    It is the most restrictive access control model. The MAC grants permissions by matching object labels with subject label based on the respective level. To determine if certain access is granted to a user or not the object and subject label are compared. Such model would be an optimal choice for restrictive settings such as military because sometimes the individuals with lower security clearance shouldn’t access the top secrets. The model will be a least optimal choice for such situations where all the individuals need to access all the information and no one is…

    • 95 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The authors give several examples of security breaches, but do not do a good job of illustrating that those security breaches were the direct or indirect result of a password re-use. Indeed, some of the incidents were a clear case of passwords being stolen and then used. While these incidents are definitely a password security issue, they do not indicate that password reuse is a concern. From there the authors examine the current state of password usage and make strong recommendations…

    • 1436 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    11.3 Add-on Restrictions on computer labeling should be made to give the ranks of the computer based on the information they store and process, so that important computers can have a higher priority of protection. This is added as 11.3.6. 11.3 Add-on Restrictions on cleaning should be made, since there are several equipment in the computer room and cleaners may disconnect some equipment by mistake when they are doing cleaning and they might access some information that they should not have. This is added as 11.3.7. 11.3…

    • 2049 Words
    • 9 Pages
    Decent Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays