Questions On The Trusted Computer System

Improved Essays
1. What does DACL stand for and what does it mean? It is a type of access control defined by the Trusted Computer System Evaluation Criteria as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control)". 2. Why would you add permissions into a group instead of the individual? What policy definition do you think is required to support this type of access control implementation? User accounts are designed for individuals. Group accounts are designed to make the administration of multiple users easier. While you can log on to user accounts, you can't log on to a group account. Group accounts are usually referred to simply as groups. You use groups to grant permissions to similar types of users and to simplify account administration. If a user is a member of a group that can access a resource, that particular user can access the same resource. Thus, you can give a user access to various work-related resources just by making the user a member of the correct group. Note that while you can log on to a computer with a user account, you can't log on to a computer with a group account Adding permissions in a group is a lot more resourceful and less time consuming via individually. Group Policies …show more content…
Storing passwords using reversible encryption is essentially the same as storing plaintext versions of the passwords. For this reason, this policy should never be enabled unless application requirements outweigh the need to protect password information. This policy is required when using Challenge-Handshake Authentication Protocol (CHAP) authentication through remote access or Internet Authentication Services (IAS). It is also required when using Digest Authentication in Internet Information Services

Related Documents

  • Decent Essays

    7. Application Access Control Access to programming, framework utilities and project source libraries might be controlled and confined to those approved clients who have a sensible industry need frameworks or database administrators. Approval to utilize an application might rely on upon the accessibility of a permit from the supplier. Give security from unapproved access by any utility, OS software, and malicious programming that is equipped for bypassing framework or application controls.…

    • 118 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Due to the levels of GPOs, the lower level individual that is the user can have supremacy over the higher level. If a manager is to be assigned with a specific privilege to carry out something but not the others in the group than it can be done through Active Directory. It makes easier to track the management of security and privileges without any mistakes. If mistakes happen then it can be managed and…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    MISSION AND VISION The mission of the 90th Security Support Squadron [SSPTS] is to “Protect F.E. Warren AFB and defend America with the world’s premier ICBM force” (F.E. Warren Air Force Base Fact Sheet, n.d.). The vision of the 90th SSPTS is “Ready to fight ... Anytime, Anywhere” (F.E. Warren Air Force Base Fact Sheet, n.d.) .…

    • 622 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Meaning the sysadmin can set restrictions to a user that would only allow him to run specific privileged commands. Another way to control user permissions is to use Access Control Lists. ACLs can be edited by using getfacl and setfacl. ACL entry has a qualifier (type A) to set the preferred permissions for users and groups. Using pam_listfile will also restrict groups from opening files they do not need to…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In its fiscal year 2016 assessment report, ICS-CERT listed the most prevalent critical infrastructure vulnerabilities and potential risk that may result from exploitation of these weaknesses. 1. Boundary protection: Weaker boundaries between industrial control systems and enterprise networks makes it difficult to detect unauthorized activity in critical systems. 2. Least functionality: It is important for organizations to minimize and close unused services, ports, protocols, applications and functions that increases vectors for malicious party to gain access to critical systems.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Royal Security Review Template Welcome to our Royal Security Review! The team at Royal Security has over one hundred years of combined experience in home security. Additionally, they provide you with $2,500 in equipment that you can use to customize a system that best suits your needs. Or, you can opt to have them build a plan for you. Royal Security offers home security and home automation options as well.…

    • 1519 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Illegal immigration is a national problem, which needs acknowledgment. An Illegal alien as they are called is a foreigner who has entered or resides in a country unlawfully or without the country's authorization. (Dictionary.com Unabridged. Random House) There were 11.1 million unauthorized immigrants in the U.S. in 2014, a total unchanged from 2009 and accounting for 3.5% of the nation’s population.…

    • 562 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    What would it take for a person to help someone that is in a desperate situation? " The Wallet" by Andrew McCuaig has four main characters: Elaine, Troy, Jose, and a young woman. It is about a women name Elaine, who works on the highway at a toll booth, collecting toll money from cars. Also she gets harassed in some way by her co-workers. Then late at night a woman in a yellow chevette pulls up with children in the backseat and she ask Elaine for money with showing signs of trouble.…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Workstation Security Policy A workstation policy provides standards for access to information inside the facility in a controlled manner, respecting guidelines set by the Health Insurance Portability and Accountability Act (HIPPA). The purpose of this policy is to provide guidelines to properly ensure workstation security within healthcare companies. Workstation security policy ensures the security of information on the workstation and information accessed by the workstation. Additionally, this policy provides guidelines on how to ensure that the requirements of HIPPA are met.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Chapter 9

    • 1156 Words
    • 5 Pages

    Submit the questions as a Word document attachment. Chapter 9 Project Questions: 56, 59, & 60. Ensure you include a link to the websites and APA information. Chapter 9 Review Questions: 1, 2, 4, 7 - 9, 11 - 19, 30, 31, 36, 38 - 45, 51, & 54. Chapter 10B Review Questions: 8 - 11.…

    • 1156 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Group are collection of individuals whose interaction are structured by norms and rolls” (Johnson & Johnson 2013, pg 7). In theory there are four types of groups. A pseudogroup is a group that consisted of member put together to work but have no vested interest in doing so. The second type of group is a traditional working group in which members asked how to do their jobs. The next group is an effective group where members are commit to success and group goals.…

    • 1234 Words
    • 5 Pages
    Improved Essays