Access control in Windows is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing. These can be configured by the end user to fit their needs from the control panel in windows.

Permissions is the type of access that is granted to a user or group for an object or object property. They can be granted to any user, group, or computer by the security principals, who are the lead owners of the computer. Ownership of objects is a control that allows owner (creator) of the object to assign permissions for an object, the owner of the object can always change the permissions. Inheritance allows administrators to easily assign and manage permissions. This feature automatically causes objects within a container to inherit all the inheritable permissions of that container. For example, the files within a folder inherit the permissions of the folder. Only permissions marked to be inherited will be inherited. User rights grant specific privileges and sign-in rights to users and groups in your computing environment. These rights authorize users to perform specific actions, such as signing into a system interactively or backing up files and directories. User rights are different from permissions because user rights apply to user accounts, and permissions are associated with objects.

Don't use plagiarized sources. Get Your Custom Essay on
Just from $13/Page
Order Essay

With administrator’s rights, a user can audit users’ successful or failed access to objects. The user can select which object access to audit by using the access control user interface.

Use of current access controls to secure the system 

Security wise, access controls secure the user’s computer by identifying users who use the computer it is easy to track any malpractice carried out using the said computer, Further, user authentication protocols deny access to unauthorized users and groups. Finally, authorization protocols help set well-defined limits on the access that is provided to authorized users and groups. This generally helps keep a user’s computer secure from unauthorized intrusions.

Deficiencies and or opportunities for increasing security and provide suggestions for remediation and/or configuration changes.

Remote access across numerous devices poses a threat as loss of a device can lead to unauthorized access to files should a device be stolen. Such a breach may give time to the person in possession to select which object access to audit potentially causing damage to the primary computer. This threat can be overcome by introducing two step verification in the authentication process. This will require anyone in possession of the device to very their identify using two different methods thus reducing the risk of unauthorized access.

Physical security is every bit as important as issues related to software or networks. A stolen laptop, or one left behind in a taxi or a restaurant, can lead to significant risk of data loss. For a business or a government agency, the impact can be disastrous, and the consequences are even worse in regulated industries or where data breach laws require public disclosure. This can be prevented by enabling BitLocker device encryption. (BitLocker is the brand name that Microsoft uses for the encryption tools available in business editions of Windows.)


DulceMontemayor. (n.d.). Access Control Overview (Windows 10). Retrieved from

Bott, E. (2019, June 28). The Windows 10 security guide: How to safeguard your business. Retrieved from

NIST 800-53. 


Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code LEMONADE