Discussion: Multilayer User Access Control
400 words of content
APA Format with references
Learning Objectives and Outcomes
Identify what implementation method(s) can be used to incorporate multilayer access control
Describe and how each method benefits multilayered access control.
Read the worksheet attached below named “Multilayer User Access Control” and address the following:
Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.
Use the following checklist to support your work on the assignment:
I have articulated my position clearly and logically.
I have supported my argument with data and factual information.
I have provided relevant citations and references to support my position on the issue discussed.
I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
Implementing multiple layers in security is providing a defense-in-depth mechanism and therefore stronger protection for the network and users. Multiple layers provide multiple road blocks for a user and attacker. Having multiple controls in place before something can be accessed may be tiresome for a user; however, the goal is to have the same effect on an attacker. If an attacker is able to find a hole and access a company’s network, additional layers of security might stop the attacker from reaching other systems, applications, or sensitive data.
In this exercise, you will learn about creating layers within the network.
Complete the table:
|Access Control Method||Implementation Method(s)||How It Benefits Multilayered
|User Access Control Profiles|
|File and Folder Access|