Assignment 1: Designing FERPA Technical Safeguards
Darryl W. Anderson
CIS 349
January 15, 2017
In the past, academic and administrative computer systems were isolated, either for security reasons or as a result of limited interconnectivity with other computers. Today, nearly any information that an administrator, teacher, student or parent might is available through a network connection. Course lectures are presented are viewed and students submit their assignments via the internet school class shell. Student and parents can view their grades online, administrative paperwork and other information can be shared through a variety of systems. The internet is an awesome and convenient way to communicate, but it introduces
…show more content…
This process simplifies access controls by maintaining access control at a single location. One issue with this control method is that the central access control unit is a single point of failure. If the centralized access control unit fails, no access can be granted to objects. Additionally, the central access control can hinder performance if the system is unable to keep up with all access requests. Remote Authentication Dial-In User Service (RADIUS) offers a centralized access control for remote users. Users are authenticated off of the user list on the RADIUS server. You have the ability to configure the server to hang up and then call the valid user back at a predefined telephone number. Another example of centralized access control for remote users is Challenge Handshake Authentication Protocol (CHAP). CHAP presents a challenge when a user requests access. Access is only granted if the user responds to the challenge correctly. CHAP uses encryption during the process which enhances overall security. Decentralized access control defers the process of access control administration closer to the system in question. This approach places a heavier requirement on administration than centralized access control because a system may need to be secured at multiple locations. It is usually more stable without a single point of failure or single point of access exists.
Each user will be granted password access to required information. The network will not allow external access from users or computers not tied into it. Higher levels of access will also involve hardware such as smart cards or fobs for access to data and only be able to access data from a central location. (Merkow & Breithaupt 2006) All transactions and account information will be centralized with limited accessibility.
Access Control- This technique is used to allow on genuine and users that are authorized access to the network resources. Since IOT is becoming ubiquitous , privacy is of foremost important and the sensitive information should be disclosed only to authentic users.
The proposed strategy is executed the same way as Role-based access control. The proposed strategy is less efficient which limits the functioning of the system (Bethencourt et al., 2007).
Access control is generally a policy or a procedure that allows, denies or restricts access to a system. It also monitors and records all attempts made to access a system. Access Control may also identify users attempting to make an unauthorized access to a system. It is a mechanism which is very much important for providing security. Various access control models are in use, including the most common Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC). All these models are known as identity
Methods used for enforcing access policies vary extensively depending on the architecture of the NAC or Security Automation and Orchestration solution. Some solutions enforce control at the point of access to the network (e.g., switch port or wireless access point), which is similar to enforcement used in 802.1X. Other solutions may enforce controls using software agents residing on endpoint devices, via inline appliances or gateways deployed in the network, or by manipulation of commonly used protocols in the network (e.g., TCP, DNS, DHCP).
Proper access controls are imperative within all HOC’s networks and facilities. HOC is a nonprofit housing organization that deals with a lot of sensitive information because NASA critical to the clients security in many cases. This is way access to information must be controlled on a strict need to know basis in order to protect the client and the organization.
As communication technology becomes more flexible and easier to use, it is increasingly being used more and more on a daily basis. With the development of communication technology it is has become easier for individuals to communicate with each virtually through the internet. The use of this technology can help better academic activities to a higher education level, as well as contribute to a more universal access to education, the delivery of quality learning and teaching and more efficient education management while modernizing the teaching curriculum.
Over the past decade, there have been numerous strides in technological fields and a growing need to integrate technology into our daily lives. Larger organizations like corporations and universities continually search for new technology to upgrade their infrastructure and computers. In universities, nearly every student has at least one internet connected device. This, and other hardware needs such as servers for storing grades and documents, cause universities to spend over $6.94 billion on hardware and software, not including salaries.[2] More recently, lectures and labs are trying to migrate notes and work onto the web. The movement to integrate technology into education of universities, especially in the field of science, has not been
At the point when conveyed deliberately, Windows Access Control advancements can give essential segments of a more extensive arrangement of approaches and advances that oversee security chances successfully, empower consistent with regulations, ensure business resources and protected innovation, and decrease the danger of obligation. (csrc.nist.gov)
In e-learning courses, information is offered over computer networks to instructors and students who are often in different physical locations, but are accessing the same materials through their computers.
Prior, In the creating stage, we used to make applications and information stockpiling on the neighborhood servers. In the event that neighborhood server or neighborhood framework crashes, the whole framework, applications and related information crashes consequently. It was turning into an enormous issue everywhere throughout the world. To defeat this issue, the idea of distributed computing was brought out vigorously. Be that as it may because of expanding size of clients’ numerous security related issue emerges and after that security issues turned out to be most regular in the enthusiasm of analysts. Security models, for example, Mandatory Access Control and Discretionary Access Control have been the methods by which data were secured and get to was controlled. However, because of the unbend-ability of these models, the fairly new security idea of Role-Based Access Control (RBAC) was proposed by the National Institute of Standards and Technology (NIST) which guarantees to end up a more unmistakable security model. Be that as it may, because of expanding size of clients giving noteworthy security has ended up bottleneck. This paper portrays access control, idea of RBAC (Role-based Access Control) display, its downside and finally we finish up to depict proposed research work to lessen security hazard.
It is a process of access control which controls users to access their destined roles and authorizations. They may be based on the basis of name of
Generally, conventional access control procedures accept the presence of the information holder and the capacity servers in the same trust space. This opinion, no more useful when the information are outsourced to a remote CSP, which takes the full charge of the outsourced information administration, and lives outside the trust area of the information holder. The
Large organisations and universities and even small schools all around the world have adopted internet to improve the communication and coordination processes
In most Nigerian schools, officials and staff still go through the laborious exercise of manually registering students, maintaining records of students‟ performance, keeping inventory list of supplies, doing cost accounting, paying bills and printing reports. The huge man-hour spent on these exercises can be drastically reduced with IT technologies to enhance overall management procedure. Thomas (1987), said that “Computers bring great speed and accuracy to each of these tasks, along with the convenience of storing large quantities of information on „small disks or tapes‟ (P.5). For the purpose of this project, problems related to the management of information regarding student and their academic work, including teachers and subjects is the matter of concern. To alleviate these problems I have designed and developed a web-based student information system termed, Electronic Student Management System (E-SMS) to automate the management of information and essential administrative work regarding student registration, maintaining records of students‟ performances, teachers, subjects and class managers in an academic school year.