blog




  • Essay / System Access Controls - 1004

    1. The most common types of system access controlsAccess control determines the authorized activities of legitimate users, mediating each attempt by a user to access a system resource and preventing unauthorized users from accessing the system . This requires unique user identification, an emergency access procedure, automatic logout as well as data encryption and decryption. Some common types of access control include: user-based, role-based, and context-based access control with the highest security on context-based access control. “LaTour, Kathleen M. (2010) AHIMA. Health Information Management – ​​Concepts, Principles and Practices – 3rd Edition. Chapter 9 Pages 255”. The steps in the access control process are as follows: a) Identification by a unique user identifier. This can be a combination of first and last name.b) An authentication that contains information known to the user (such as a password, PIN, phrase and passcode), accessories owned by the user (such as keypads, smart cards and tokens) and something personally linked to the user. user's body (biometric systems including voice recognition, fingerprints and retinal scanners).c) Accounting that limits user access to the minimum necessary. Responsibility for user action must be controlled by audit trails.2. Three indications of inadequate system security protection. Network layer security. Inadequate system security protection primarily targets outsiders attempting to gain unauthorized access to the system. It has also been used to detect changes in system performance indicating, for example, a virus or worm attack. Attention can then be turned to assessing the damage or revising the controls under attack. Viruses and worms are forms of malicious code. A virus is a segment of code that replicates itself by attaching a copy...... middle of paper ... allowing you to use all the power features mentioned here. When you create an account or change your password on a system, you should receive instructions about any limitations. Password reminder: Choose a phrase that reminds you of the password. If you absolutely must, save it somewhere secure. It's probably safest to store a strong password in a place where someone would have to physically break into it. Protect your password strong: Do not enter your password on untrusted, unknown or public computers. Be careful when entering your password into a strange program, website, or server. Whenever possible, use software that encrypts your password when it is sent over the network. Never use the same password for a risky or occasional service. Do not use the same password on unofficial, entertainment and off-campus sites. Replace your strong password when it is worn out.