K1.25 Methods of managing and controlling access to digital systems and their application within the
design of network security architecture:
• authentication – restricts or allows access based on system verification of user
• firewalls – restricts or allows access to a defined set of services
• intrusion detection system (IDS) – analyses and monitors network traffic for potential threats
• intrusion prevention system (IPS) – prevents access based on identified potential threats
• network access control (NAC) – restricts or allows access based on organisational policy enforcement
on devices and users of network
• mandatory access control (MAC) – restricts or allows access based on a hierarchy of security levels
• discretionary access control (DAC) – restricts or allows access based on resource owner preference
• attribute-based access control (ABAC) – restricts or allows access based on attributes or
characteristics
• role-based access control (RBAC) – restricts or allows access to resources based on the role of a
user
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|