You are on page 1of 2

NAME: Ron Ace Jarantilla COURSE/SECTION: BSIT – 102I

SUBJECT: Fundamental of IT – ITC 103

WW2: Finals Assignment # 4 – M5U4

1. What are the four processes of an access control system?


 An access control system is generally described in terms of four major processes:
Identification, Authentication, Authorization, and Accounting.
2. Users should only be granted the minimum sufficient permissions. What system policy
ensures that users do not receive rights unless granted
explicitly?
 To guarantee the maximum level of security, mandatory access control employs a
centralized management paradigm. As a non-discretionary system, MAC delegated
authority over access policies to a centralized security administration. It operates by
assigning security labels to resources and individuals.
3. What is the main type of non-discretionary access control?
 Mandatory Access Control (MAC) – To guarantee the maximum level of security,
mandatory access control employs a centralized management paradigm. As a non-
discretionary system, MAC delegated authority over access policies to a centralized
security administration. It operates by assigning security labels to resources and
individuals.
4. What type of control prevents a user from denying they performed an action?
 Non-repudiation – it is a principle that the user cannot deny having performed some
action.
5. What sort of account allows someone to access a computer without providing a user
name or password?
 Guest User Account – this account is also disabled by default. If the guest account is
enabled, anyone can use the computer without needing to enter a password.
6. How does a one-time password work?
 An asymmetric encryption technique generates the password. This means that the
authenticating server can identify that the number was created by a certain device
(fob) at a specific time.
7. What type of system allows a user to authenticate once to access multiple services?
 Single Sign-On (SSO) – It means that a user only requires to authenticate to a
system once to have access to all of its resources; that is, all of the resources
whereby the user has been granted privileges.
8. What type of cryptographic operation(s) are non-reversible?
 Cryptographic Hashing – Hash functions are not reversible. This indicates that it is
secure. Cryptographic hash functions are built on the assumption of non-reversible
functions.
9. What class of data is a transport encryption protocol designed to protect?
 Data in transit (or data in motion) – this is the state when data is transmitted over a
network. In this state, data can be protected by a transport encryption protocol, such
as Secure Sockets Layer (SSL)/Transport Layer Security (TLS).
10. Why is it important not to use simple words or names as a password?
 Password-cracking software includes dictionaries of such names and phrases. Even
if the password is encrypted, if it matches a term in the password-cracking dictionary,
it will be discovered in seconds.

You might also like