1. Access controls are security features that are considered the first line of defense in asset protection. They are use to dictate how subject access objects, and their main goal is to protect the objects from unauthorized access. These controls can be administrative, physical or technical in nature and should be applied in layered approach, ensuring that an intruder would have no compromise more than one countermeasure to access critical asserts. Explain each of these controls administrative, physical and technical with examples of real world applications. 2. Access control defines how users should be identified, authenticated and authorized. These issues are carried out differently in different access control models and technologies, and it is up to organization to determine which best fits its business and security needs. Explain each of these Access controls with examples of real-world applications applications. 3. The architecture of a computer system is important and comprises many topics. The system has to ensure that memory is properly protected and segregated, ensure that only authorized subjects access objects, ensure that entrusted processes can not perform activities that would put other processes at risk, control the flow of information, and define a domain of resources of each subject. It also ensure that if the computer experience any type disruption will not result in an insecure state. Many of these issues are dealt with in the system’s security policy, and the security model is built to support the requirements of this policy. Given this definitions, provide an example where you could better design computer architecture to secure the computer system with real-world applications. You may use fictitious examples to support your argument. Looking for the best essay writer? Click below to have a customized paper written as per your requirements.
