Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
IS3230
7-10-15
Enrique Roca
IS3230
7-10-15
what, when, where, why and how and each of these must be taken into account when designing
the authorization system. (Ballad, 2011) One key principal that all security managers must
implement would be the Principal of Least Privilege. Simply put where users are concerned, least
privilege states that a user should only be granted the minimal privileges necessary to perform
their work to accomplish a specific task.
In conclusion unless a company wants to allow anyone and everyone unrestricted access to their
resources there must be a set of checks and balances put into place to restrict access. This
restriction is in the form of Identification, Authentication and Authorization to company
resources with the implementation of principal of least privilege.
Works Cited
Ballad, B. B. (2011). Access Control, Authentication, and Public Key Infrastructure. Burlington:
Jones & Bartlett Learning.
Barker, K. (2013). CISCO Official Certification Guide. Indanapolis, Indiana, USA: Cisco Press.
Stewart, J. M. (2011). CompTIA Security+. Indanapolis: Sybex