Walden University Access Control Network Security Paper
Description
Discussion
You may not realize it, but you encounter various types of access control almost every day. When you use your keys to lock a door or enter the PIN to your debit card at an ATM, you are using an access control method.
Access control is a process by which users are identified and granted certain rights or privileges on the basis of some predefined policy. It can limit the information that is allowed to pass through a system and also enable or disable a user from using that system.
Describe a situation that you encountered either personally or professionally involving access control where the access control method used was either not appropriate or did not work as expected. How was the situation resolved? If the method was inappropriate, what would have been a more appropriate solution? If the method did not work as expected, what could have been done to correct the problems? Explain your answer.
Be sure to defend and support your opinion and remember to properly cite your sources according to APA guidelines.
Assignment
Key recovery, or key escrow, is a recovery mechanism that stores copies of encrypted keys in separate, often centralized, locations. The term encompasses many different ways of permitting forced access to encrypted data.
The basic purpose of key recovery is to allow authorized third-party users to access encrypted data. However, to ensure that only the intended recipients are allowed access to the keys, the data log must be strictly monitored, and access must be granted only under restricted conditions.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."