The document discusses various methods for securing user access to computer systems, including permissions, authorization, authentication, data encryption, firewalls, virtual private networks, intranets, user accounts, sharing permissions, and password methodologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
45 views12 pages
IT Sir Arienza Access-Security
The document discusses various methods for securing user access to computer systems, including permissions, authorization, authentication, data encryption, firewalls, virtual private networks, intranets, user accounts, sharing permissions, and password methodologies.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12
Security
What is User Access?
• User access security refers to the collective procedures
by which authorized users access a computer system and unauthorized users are kept from doing so Permission, Authorization and Authentication
• Permission– refers to the access given to a particular
user in accordance to what they can access on the software
• Authorization – refers to the access given to a particular
user in accordance to their tasks or organizational roles.
• Authentication – refers to be method of confirming the
identify of the user accessing the system Rule for granting access:
• User access security demands that all persons (or
systems) who engage network resources be required to identify themselves and prove that they are, in fact, who they claim to be. Users are subsequently limited to access to those files that they absolutely need to meet their job requirements, and no more. To accomplish this, decision-makers must establish policies regulating user account systems, user authentication practices, log-in procedures, physical security requirements, and remote access mechanisms. Common Methods of Securing System:
• Data Encryption – Hard drives, database or messages
are converted into a encrypted format before writing them or reading from the storage device. (Vice Versa)
Encrypt
Storage Client Convert Encrypt Device Firewall
• A firewall is a system designed to prevent unauthorized
access to or from a private network. You can implement a firewall in either hardware or software form, or a combination of both. Firewalls prevent unauthorized internet users from accessing private networks connected to the internet, especially intranets. Virtual Private Network (VPN)
• VPN not only secure their company systems but as well
as their employees connection. This is used to hide their network activities – traces of IP, identities and vulnerabilities. Intranet
• Administrator’s secure their system by ensuring it is only
accessible on their intranet.
• An intranet is a private network contained within an
enterprise that is used to securely share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and teleconferences. Access and Accounts
• Users are given their own accounts within the orgnization
that they can use to access the system.
• Types of user accounts
• System accounts. ...
• Super user account. ...
• Regular user account. ...
• Guest user account. ...
Sharing and Permission Policy
• There are three types of share
permissions: Full Control, Change, and Read. Full Control: Enables users to “read,” “change,” as well as edit permissions and take ownership of files. Change: Change means that user can read/execute/write/delete folders/files within share. Authentication
• A password, sometimes called a passcode, is a
memorized secret, typically a string of characters, usually used to confirm a user's identity and the one that is most commonly used in Authentication.
• Other authentication can be security questions or in
advance technology can be thru access cards with RFID embedding and the used of biometrics. Password Methodologies:
• To make passwords secured many system developer
required the use of numbers, letters and special characters combination to avoid hacking attacks. (There are automated software can be use to populate and guess your passwords – Keylogger)
• They also know implement the use of Image Captchas