week 25

K1.25 Methods of managing and controlling access to digital systems and their application within the

design of network security architecture:

• authentication – restricts or allows access based on system verification of user

• firewalls – restricts or allows access to a defined set of services

• intrusion detection system (IDS) – analyses and monitors network traffic for potential threats

• intrusion prevention system (IPS) – prevents access based on identified potential threats

• network access control (NAC) – restricts or allows access based on organisational policy enforcement

on devices and users of network

• mandatory access control (MAC) – restricts or allows access based on a hierarchy of security levels

• discretionary access control (DAC) – restricts or allows access based on resource owner preference

• attribute-based access control (ABAC) – restricts or allows access based on attributes or

characteristics

• role-based access control (RBAC) – restricts or allows access to resources based on the role of a

user


Last Updated
2024-07-11 09:04:44

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage





Files that support this week


| | | | |
Week 24
Prev
Week 25
Prev
Week 26
Prev

Next

Next
Webmaster Spelling Notifications