Computer System Security and Access Controls
System Security is a wide field that covers computer system protection: your login accounts with passwords, using file protection to secureyour data unauthourized people and even getting to the wrong hands, encrypting network communications lines and security firewalls from attack from attack from hackers.
computer system security Methods.
System Access Controls.
Ensuring that unauthorized users don’t get into the system, and by encouraging (and sometimes forcing) authorized users to be security-conscious–for example, by changing their passwords on a regular basis. The system also protects password data and keeps track of who’s doing what in the system, especially if what they’re doing is security-related (e.g., logging in, trying to open a file, using special privileges).
|
Controlling Data access |
there are various way one can prevent
security prevention measures
Authentication
A means for one party to verify another’s identity. For example, a client gives a password to Directory Server during an LDAP bind operation.
Defines the criteria that a password must satisfy to be considered valid, for example, age, length, and syntax.
Protects the privacy of information. When data is encrypted, it is scrambled in a way that only the recipient can understand.
Tailors the access rights granted to different directory users, and provides a means of specifying required credentials or bind attributes.
Disables a user account, group of accounts, or an entire domain so that all authentication attempts are automatically rejected.
Maintains the integrity of information. If encryption and message digests are applied to the information being sent, the recipient can determine that it was not tampered with during transit.
Allows you to determine if the security of your directory has been compromised. For example, you can audit the log files maintained by your directory.
Kipkorir is the founder of advancelearnlinux.com with over 6 years in information technology(Microservices, Analytics, Power BI, and Database Development). He’s also passionate about Data analytics and Data Science.
Leave a Reply