NAME: Ron Ace Jarantilla COURSE/SECTION: BSIT – 102I
SUBJECT: Fundamental of IT – ITC 103
WW2: Finals Assignment # 4 – M5U4
1. What are the four processes of an access control system?
An access control system is generally described in terms of four major processes: Identification, Authentication, Authorization, and Accounting. 2. Users should only be granted the minimum sufficient permissions. What system policy ensures that users do not receive rights unless granted explicitly? To guarantee the maximum level of security, mandatory access control employs a centralized management paradigm. As a non-discretionary system, MAC delegated authority over access policies to a centralized security administration. It operates by assigning security labels to resources and individuals. 3. What is the main type of non-discretionary access control? Mandatory Access Control (MAC) – To guarantee the maximum level of security, mandatory access control employs a centralized management paradigm. As a non- discretionary system, MAC delegated authority over access policies to a centralized security administration. It operates by assigning security labels to resources and individuals. 4. What type of control prevents a user from denying they performed an action? Non-repudiation – it is a principle that the user cannot deny having performed some action. 5. What sort of account allows someone to access a computer without providing a user name or password? Guest User Account – this account is also disabled by default. If the guest account is enabled, anyone can use the computer without needing to enter a password. 6. How does a one-time password work? An asymmetric encryption technique generates the password. This means that the authenticating server can identify that the number was created by a certain device (fob) at a specific time. 7. What type of system allows a user to authenticate once to access multiple services? Single Sign-On (SSO) – It means that a user only requires to authenticate to a system once to have access to all of its resources; that is, all of the resources whereby the user has been granted privileges. 8. What type of cryptographic operation(s) are non-reversible? Cryptographic Hashing – Hash functions are not reversible. This indicates that it is secure. Cryptographic hash functions are built on the assumption of non-reversible functions. 9. What class of data is a transport encryption protocol designed to protect? Data in transit (or data in motion) – this is the state when data is transmitted over a network. In this state, data can be protected by a transport encryption protocol, such as Secure Sockets Layer (SSL)/Transport Layer Security (TLS). 10. Why is it important not to use simple words or names as a password? Password-cracking software includes dictionaries of such names and phrases. Even if the password is encrypted, if it matches a term in the password-cracking dictionary, it will be discovered in seconds.