Access control in Windows is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing. These can be configured by the end user to fit their needs from the control panel in windows.
Permissions is the type of access that is granted to a user or group for an object or object property.
With administrator’s rights, a user can audit users’ successful or failed access to objects. The user can select which object access to audit by using the access control user interface.
Use of current access controls to secure the system
Security wise, access controls secure the user’s computer by identifying users who use the computer it is easy to track any malpractice carried out using the said computer, Further, user authentication protocols deny access to unauthorized users and groups. Finally, authorization protocols help set well-defined limits on the access that is provided to authorized users and groups. This generally helps keep a user’s computer secure from unauthorized intrusions.
Deficiencies and or opportunities for increasing security and provide suggestions for remediation and/or configuration changes.
Remote access across numerous devices poses a threat as loss of a device can lead to unauthorized access to files should a device be stolen. Such a breach may give time to the person in possession to select which object access to audit potentially causing damage to the primary computer. This threat can be overcome by introducing two step verification in the authentication process. This will require anyone in possession of the device to very their identify using two different methods thus reducing the risk of unauthorized access.
Physical security is every bit as important as issues related to software or networks. A stolen laptop, or one left behind in a taxi or a restaurant, can lead to significant risk of data loss. For a business or a government agency, the impact can be disastrous, and the consequences are even worse in regulated industries or where data breach laws require public disclosure. This can be prevented by enabling BitLocker device encryption. (BitLocker is the brand name that Microsoft uses for the encryption tools available in business editions of Windows.)
SOURCES
DulceMontemayor. (n.d.). Access Control Overview (Windows 10). Retrieved from https://docs.microsoft.com/en-us/windows/security/identity-protection/access-control/access-control
Bott, E. (2019, June 28). The Windows 10 security guide: How to safeguard your business. Retrieved from https://www.zdnet.com/article/the-windows-10-security-guide-how-to-safeguard-your-business/
NIST 800-53.
gov/manuscript-publication-search.cfm?pub_id=917904″>http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917904
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more