Access controls and authentication systems are some of the most ubiquitous of all information securitycontrols. Too often these controls still hinge on poorly implemented and managed password strategies.
However, a wide array of technologies and tools is available to organizations seeking to secure theirinformation assets. As governments create more regulations and organizations experience larger and morewidely publicized breaches of personal data, these organizations may more frequently turn to additionallayers of controls to supplement traditional access and authentication strategies.
Use the study materials and engage in any additional research needed to fill in knowledge gaps.
Write a 4–6page paper that covers the following topics:
Describe your lab experiences related to access controls and authentication systems available for use in organizations to protect information assets.
Analyze the security characteristics of commonly used file systems.
Explain how access control lists play a role in a layered network security strategy.
Explain the security benefits available through domain separation, process isolation, resourceencapsulation, and least privilege.