Application Of Access Control System

1112 WordsJun 28, 20155 Pages
Access control is the next component in hardening the security for this facility. Access control defines who has access to systems, data and dialogue using cryptographic protections (Boyle & Panko, 2013). An Access control system provides three main functions, authorization, authentication and auditing (Boyle & Panko, 2013). It is recommended that a directory server be installed to provide centralized authentication, authorization and auditing services for this facility. A directory server is a hierarchical database of an organization (Boyle & Panko, 2013). The hierarchical structure of the database begins with the top level or organization (O), which can then be broken down to several organizational units (OU) underneath (Boyle & Panko, 2013). There can be several levels of OUs depending on the security policies that are defined, which each OU being defined with specific authorization and access to specific network systems and resources (Boyle & Panko, 2013). Under OUs are nodes, which can be applications or user groups. Under the nodes are the people objects, which store login credentials and user information such as names, email address, home addresses, phone number etc. (Boyle & Panko, 2013). Figure 2 shows an example of the hierarchical structure used in a directory server. Figure 2 (Boyle & Panko, 2013) Once the directory server is set up all computer workstations and wireless laptops will then need to be configured to authenticate each user at login

More about Application Of Access Control System

Open Document