Access Controls
Authentication is the process of validating a user and it ensures that proper authorization or access is given to resources. The "rights" are assigned by an administrator when objects are created on a network.
In this report, determine the best practices used to determine the "rights" of a user and specify which authentication method you would implement. There are three traditional authentication methods, but a newer method has been added (something you produce, and sometimes it is somewhere you are).
Consider your own network design, what are the advantages or disadvantages to your approach, and are there any weaknesses to the design? Can you completely minimize or eliminate misuse of resources or human error? What types of controls can we implement to help control the "human element"
Please submit this as a formal technical document.
This is a document so it should be submitted using MS word and be professional formatted.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here