Edudorm Facebook

Network access control system

  • Find a commercial automated network access control product/system and summarize its functions and components.

Components of a door station

A door station is an example of automated network access control system. It is a system positioned at the door of a workplace or homes which is able to make get in touch with the central station only. It communicates only with the central station which is the main station. It contains a discreet video camera together with a doorbell as well as a two way communication system in order to enhance more security mostly in offices and homes. A door station is connected to a television or a security observer and because of presence of the low light cameras it enables the person inside the building observe whoever is at the door. It is made in such a way that the user is able to differentiate between the two cameras inside the door station. It is weather resistance which is environmentally proved where the light is enough for the user to locate the doorbell even when it is dark.

Functions of a door station

It makes sure that communication is efficient inside the house as a result of the comPoint keypads all over the house. It is important as it is used to check the person at the door. It allows communication between the visitor and the owner of the house. This ensures total security inside the house. The communication between the visitor and the owner is efficient such that the visitor is not required to press any button when the conversation is taking place. It is time efficient since it is fast since it uses electricity. It is able to last for long since it is resistant to the weather. It is therefore advocated for since it maintains security in homes and offices and eases communication between visitors and other people.

  • Listen to the YouTube video “Access Control Systems & Methodology Access Control Basics” posted. Pick a paper from those posted in Module 3 and complete the critique assignment for the week.

 

Summary of the paper

Access control systems are security systems used to control communication between different users with three major principles which include confidentiality, integrity and availability. There are two most important access control methods which include mandatory access control method and discretionary access control method which are used to sustain security in most homes. A discretionary access control enables the owner of the resource to identify the subjects which can access the resources. It enhances security of the owner in a way that the owner decides on which type of subjects to access certain resources unlike in mandatory access. Mandatory access on the other hand is used in the environments especially by military people since confidentiality and availability guide this access since it is based on security classification systems.

Access control

Access is a precise interaction between an object and the subject.

An example of a subject is a person while an example of an object is the device used in the access method.

There are two important access controls namely mandatory access and discretionary access methods.

Access control is guided by availability, integrity and confidentiality as the key basic principles.

Access controls are the security traits which direct how systems and users interact and keep in touch with each other.

Discretionary access control

DAC as commonly known uses the concept of an owner.

Access control is based on the judgment of the holder.

Owners using DAC are able to make decisions which are based on the subjects they chose.

UNIX file mode is an example of DAC which enables the user to read and write.

Another example of DAC is capability systems which allow the owners to make decisions on their own regarding the subject.

Mandatory access control

MAC is commonly used in the environment especially by militants.

MAC is mainly guided by two principles which include confidentiality and availability.

Security labeling system is the basis on which MAC is ensured.

Security clearances and labels containing information classifications are most important for users to have them.

A sensitivity label is the key to every subject as well as an object when using the MAC model.

Main issue to be addressed

The issue of hacking should be addressed by the access control methods since insecurity cases are on the rise.

Strong passwords should be used in order to maintain the information confidential.

Passwords used should be hard to guess since criminals can get access to confidential information

Environment should be well secure using remote sensed systems.

IDS should be employed in order to notice suspicious behavior.

Email accounts should be correct to avoid suspicion by criminals.

 

 

 

 

 

 

 

 

 

 

0 Words   Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...