Beruflich Dokumente
Kultur Dokumente
Email: engccmjayte@gmail.com
Assignment: 1 ( my words)
Date: 20/06/2020
1|Page
Q1 Explaining types of Access controls
Access control is the process of allowing or denying the user to use some specific programs and
tells us who can enter the system and use some specific resources using some policies and access
control is the most important part in security and also protecting the devices such as
communication and network devices because it can protect what we need to be protected. An
identification is the best example of access controls and also the basic part of all access controls.
Access controls consists of three types
1) Administrative access controls
2) Physical access controls
3) And technical access controls
Administrative access controls use policies, responsibilities, laws, ideas and other administrative
functions to protect and control the system. Authentication, identification and authorization use
some policies to protect the systems.
Physical access controls use special techniques to manage and control the physical environment
and limit the contact with devices, some of the following are examples of physical access
controls;
a) Cameras that is used for recording videos
b) Sensors that is used for detection such as motion detection, fire detection, and also smoke
detection
c) Guards and also restricted areas
Technical access controls use hardware and software and technology restrictions to know the
limitation of accessing data on the system. Some techniques are as follows
a) Encryption of data
b) Using biometrics such lock screen, fingerprinting, face recognition.
c) Access control lists is one of the technical controls and also observing network
congestions.
And also the three main models of access controls
1) Discretionary Access Control
2) Mandatory Access Control
3) Role Based Access Control
Discretionary Access Control allows the owner to create and change some of the resources or to
specify and give permissions who can create and change from the resources, this flexible one that
we use in operating systems
Mandatory Access Control uses strict rules and security so the user has no choice to set any
controls and it’s the opposite of discretionary access control.
2|Page
Role Based Access Control uses some of administered set of controls it assigns the user
according to his function in the company. If you are a director or team leader only assigns your
function.
Ahmed @binbe
Farah Hbobi
3|Page
Advantage of symmetric encryption Disadvantage of symmetric encryption
Asymmetric encryption uses a key for encryption and another key for decryption so it’s known
as public private key. Public key is used for encrypting data and private key is used for
decrypting the data
Any message or information that is encrypted by using private key it must be decrypted by using
matched public key and share information without seen their secret key.
For example:
Original information Public key for cipher text Private key for
encryption decryption
The main disadvantage of asymmetric of asymmetric encryption is that it needs long time to
compute the content of the information.
4|Page
Q3 explaining of cryptography and firewalls
A) Cryptography came from two words which means secret writing and it’s an art that
is used to encrypt the information and messages to make them difficult way to
interpret easily.
Cryptography is most important part in security and consists two processes:
a) Encryption
b) Decryption
B) Firewalls is a network security that is used to prevent some authorized users to access
the network and it can be used hardware software and both of them.
It’s used as a boundary between outside network and internal network called intranet.
It consists of three main types:
a) Packet filter
b) Application level
c) Circuit level
Thanks
Abdisalan abdulkadir Mohamed. My own words
5|Page