You are on page 1of 4

Running head: MULTILAYER USER ACCESS CONTROL 1

Multilayer User Access Control

Student Name

Course Name

Instructor Name

February 10, 2021


MULTILAYER USER ACCESS CONTROL 2

Multilayer User Access Control

Access Control How It Benefits Multilayered


Implementation Method(s)
Method Access Control
 Extra access controls can be
deleted or added to the roles.
User Access
 Role-base access controls  Access controls can be
Control Profiles
adjusted if the risk associated
with position rises.
 Automatically execute
 Restricts the machine access.
more policies.
 Ensure no access is provided
 Decide which file types to
Systems Access to employees who do not
download.
install or alter system
 Allowing or not allowing
software.
trustworthy source code.
 dbcreator can build
databases, restore and
 Provides an extra protection
modify databases of its
layer.
individual.
 Application access controls
Applications  Server admin can adjust
guarantee protection if
Access configuration options
system-level fails.
across servers and shut
 The system and data are not
down servers.
fully secure.
 Sysadmin can do any
server operation.
 To make sure that no data
is compromised, limit read
and write access to files
and directories.
 Limited by who and what
File and Folder  Provides a new protective
particular files and
Access layer.
directories could be
accessed.
 Administrators should
delegate needs-based
rights.
 The last security tool is
restricted access to data.  Protects all data-based
 Privileges for reading or citizens.
Data Access
writing.  Protections against human
 Controls to limit access to error and attack.
data.
MULTILAYER USER ACCESS CONTROL 3

The above methods help protect the organization, systems, and data for an organization

that wants to enforce multi-stage access control. Restricted profiles based on users' roles allow

users to edit, remove, or have access to confidential documents only for superiors and eyes-ups.

Limiting access by systems will automatically implement policies, prevent the downloading of

malicious material and allow only access to confident sources[ CITATION Kha19 \l 1033 ].

For application access, there are three types of implementing methods. Dbcreators can

only build databases but change their databases and restore them. Severadmins can adjust

configuration options across servers and shut down servers. Sysadmins will execute any server

task. The three strategies must not be taken lightly and can only be used by trustworthy

individuals in the business and others who can control them[ CITATION gen18 \l 1033 ].

Limiting reading and writing files and folders prevents data from being breached, but

only systems and users having to do so should be restricted. Finally, the limitation of information

access to individual users protects against and unintentionally deletes human errors. Each of

these measures offers a security level.


MULTILAYER USER ACCESS CONTROL 4

References

genians. (2018, July 24). Multi-layered access control. Retrieved from genians:

https://www.genians.com/learn-more/insights/multi-layered-access-control/

Khan, M., & Naz, D. T. (2019). A multi-layered security model for learning management

system. International Journal of Advanced Computer Science and Applications, 10(12),

207-2011. doi:10.14569/IJACSA.2019.0101229

You might also like