Information Systems Homework Help
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course Access controls have been applied, or could be applied, in a practical manner to your current work
Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course Access controls have been applied, or could be applied, in a practical manner to your current work environment. share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Theories learned in the course so far • Identify the types of access control technologies used in a networking environment. • Implement knowledge-based and biometric authentication. • Identify knowledge-based and characteristics-based authentication technologies. • Recognize how single sign-on systems (SSOs), one-time passwords (OTPs), and smart cards are used for authentication • Determine the appropriate type of authentication to implement in a given enterprise scenario. • Recognize ways of securing passwords and identify different types of attacks against passwords and password files. • Select the appropriate access control model for a scenario. • Determine the most appropriate access control model to implement in a given situation. • Recognize how different types of access control techniques operate. • Distinguish between centralized and decentralized access control administration mechanisms. • Identify information detection system (IDS) mechanisms and implementation methods, and recognize various intrusion detection and prevention techniques.