Monday, October 7, 2019

Information Security Topic Essay Example | Topics and Well Written Essays - 750 words

Information Security Topic - Essay Example s serve to secure different aspects of Information .In the following article one such method to secure network called â€Å"Access Control List† would be studied and an attempt would be made to understand what level of security is achieved through its implementation. INTRODUCTION: Access Control list (ACL) at a very basic level set to define and control the various permissions that can be attached to an object .The object can be a software program like yahoo messenger, a network service like FTP, a file, sound card, other programs, the network, a modem, and so on and so forth. Access means what kind of operations can be done on these objects. Examples include reading a file, writing to a file, creating or deleting objects, communicating with another program, etc. Access Control List defines who is allowed to use that software/service and what operation can he perform on that software/service for example ACL would define who are the users who can use Yahoo messenger and whether they can use it to send files or albums through it or simply chat on it. At a very basic level they mean â€Å"An explicit set of permissions for users (or groups of users) detailing who can access specific items.† [2] CAPABILITY/ kind of security achieved : access control lists limit the access to information to the desired or permitted users . It also sets to establish privileges and permissions that a permitted user would have on the objects. An access control list can be visualized as a list containing permissions attached to an object . The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL, each entry in the list specifies a subject and an operation: for example, the entry (Bob, delete) on the ACL for file ABC gives Bob permission to delete file ABC. How ACL Work when a subject requests for an operation, the system first checks for the entry of the subject in the list in order to determine

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.