0% found this document useful (0 votes)
361 views4 pages

7 Application Letter

The document discusses access control, including the four parts of access control mechanisms: identification, authentication, authorization, and accountability. It also lists the four logical access control solutions as biometrics, tokens, passwords, and single sign-on. The document then discusses biometric recognition characteristics and the five types of authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
361 views4 pages

7 Application Letter

The document discusses access control, including the four parts of access control mechanisms: identification, authentication, authorization, and accountability. It also lists the four logical access control solutions as biometrics, tokens, passwords, and single sign-on. The document then discusses biometric recognition characteristics and the five types of authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

5.

Using your own understanding, answer the following;

1. Cite and explain the Four Parts / Mechanism of Access Control

Logical access control is defined as controlling virtual access to data; it consists


of protocols for identity, authentication and authorization used globally to secure
hardware against unauthorized access Biometric Access Controls is used to authenticate
someone by its Fingerprint comparison, Palm printcomparison, Hand geometry, Facial
recognition, Retinal print comparison while Minutiae are special reference point of
one's biometric that is stored on a demanded access as an image to be checked. Each
single attempt at entry results in a measurement to determine if the user is who he or
she wants to be according to the encoded meaning. Effectiveness of Biometrics
Biometrics are analyzed using criteria such as the rate of false denial, which is the rate of
supplicants that are currently accepted users but are refused access; the rate of false
approval, which is the percentage of users who are unauthorized but are granted
access; and third, the rate of crossover error

2. What are the Four Central Components of Access Control?


Identification
Authenticatiom
authorization
Accountability
3. Cite the Four Logical Access Control Solutions.
Biometrics, Tokens, Passwords, and Single Sign-on.

4. Cite all Biometric Recognition Characteristics


Fingerprint comparison, Palm print
comparison, Hand geometry, Facial recognition, Retinal print comparison

5. Cite and explain the Five Authentication Types

Knowledge what are the things you know


Ownership what you have to protect threat
Characteristic what is your traits
Location where you are when attacks arrive
Action what will you do to prevent it

5.2

Using your own understanding, answer the following;

1. What are the ways to monitor a system?


2. Define and explain the scope of the plan
3. What are the things to be consider in security monitoring?
4. What are the types of logs to be captured?
5. Develop a log information system
5.3a

Using pig pen, decrypt the encrypted message.

https://www.boxentriq.com/code-breaking/pigpen-cipher (Dito ko nag n=generate hahaha)

2. Using the same pig pen cipher, encrypt your LastName, FirstName and Middle Initial

1. CAN YOU FIGURE THIS OUT


2.
5.3b

Using the Caesar Cipher on the image, encrypt the following sentences.

1. I am an advocate of information security.

L dp dq dgyrfdwh ri lqirupdwlrq vhfxulwb.

2. Protect your privacy.


Surwhfw brxu sulydfb.

Assume that you are certified by the certifying bodies in Lesson2 and graduated
you’re your dream degree in the field, write down an application letter for the job, Information
Security Officer in XYZ Bank, the leading bank of the billionaires. State your credential, skills
and something that you can contribute to the organization.

Address your letter to:

Jared X. Yu

HR Manager

XYZ Bank

Attach the .docx file in in submitting your letter.

FINAL PAPER

Answer the following question through reflecting from the lessons in Information Assurance and Security.

Why is it necessary to improve the level of security of the information being processed by a developed information
system? As an IT Professional in the future, what can you do as an advocate of information privacy and security?
 

You might also like