Access Security: Most applications that are concerned with safety, security, privacy, or defense will have some method of access control .This is a security control measure that will ensure only authenticated users have access to only what they are allowed.
Its function is to prevent the forbidden use of a resource in an uncontrolled way by only giving access to objects based on their legitimacy. This can be done by only giving access to resources in the system that have access rights in terms of who can log in to the computer, which files are accessible, which programs can be executed and what actions can be performed on the system.
This access control concept therefore centers on who can access resources in a system. And what operations can be on the system, therefore access control is concerned with authorization and authentication.
………..middle of paper……….
Public Key and one or more qualities relating its Identity. A certificate authority (CA) is an authority that issues and governs security identifications and public keys for message encryption.
CA checks with a registration authority (RA) to identify information given by the person requesting for a certificate. After RA ascertains the person’s details, a certificate is issue by the CA.
Some of the best practices of PKI include defining the application certificate prerequisites, developing a CA operation plan, outlining the business scenario, creating certificate policies and practice statements and lastly is designing the certification authority (CA) infrastructure.
Ferraiolo, D., Kuhn, D. R., & Chandramouli, R. (2003). Role-based access control. Boston: Artech House.
Are you ready to order a custom essay from us ? Place your order with us today.