SlideShare a Scribd company logo
summary of paper:
Access Control Policy
Nouf Alrajeh 216006315
Bsmah AL-sahlee 216004072
Spring course 2019-2020
School of Business – Information
System Security
Induction
The London School of Economics and Political Science (LSE).Its public research university. The
main campus is situated in central London. First our course information systems security, refers to
the processes and methodologies involved with keeping information confidential, available, and
assuring its integrity. It also refers to Access controls, that it is goal to prevent unauthorized
personnel from entering or accessing a physical and logical systems. Also it is ensuring security
technology and access control policies are in place to protect confidential information.
the access control policy outlines the controls placed on both physical access to the computer
system (that is, having locked access to where the system is stored) and to the software in order to
limit access to computer networks and data. Access control policies provide details on controlling
access to information and systems, with these topics. That LES implements in networks, comms
rooms, IT systems, data and authorised users.
Policy LSE
Policy
Review and Development
ensure that it remains appropriate in
the light of any relevant changes to
the law, organisational policies or
contractual obligations. Additional
regulations may be created to cover
specific areas.
Principles
A principle which is a core
requirement of information security
for the safe utilization, flow, and
storage of information. LSE provide
for all employees, students and
contracted third parties with on-site
access to the information they need
Penetration tests
also known as a pen test, is a simulated
cyber attack against your computer
system to check for exploitable
vulnerabilities. That LSE’s use
Access control method
In order to protect assets in a company or
corporation, security analysts and programmers
can set access control to individual components
on a computer. These components can be the
operating system, programs or even hardware
settings.
Access control Authorization
Authorization is to make sure the
identity is who they say they are. We
run into it daily both in digital
(username or ID/password)
Access control is the addition of extra
authentication steps. proves they are
who they say they are
Policies, Codes of Practice,
Procedures and Guidelines
codes of practice, procedures and
guidelines are published together and are
available for viewing on LSE’s website. All
staff, students and any third parties
authorised to access LSE’s network or
computing facilities are required to
familiarise themselves
cloud system
LSE meet the access control provisions laid out
in this policy. Access controls implemented in
any cloud system is performed during the
vendor assessment and implementation stages
of any project
Principles
Generic identities: users of accounts must
be recognisable in order for LSE to meet
the conditions of its Internet Service
Provider will never be used to access
Confidential data or Personally
Identifiable Information, including data
supplied to LSE.
Privileged accounts:privilege rights shall be
restricted and controlled and not provided by
default. Privileged accounts must not be used
for standard activities; they are for program
installation and system reconfiguration, not for
program use.
Least privilege and need to know: Access
rights to both physical and logical assets. east
privilege" states that one should only have
access to what they need and nothing more.
Extend this idea to "confidentiality of data"
and you end up with "need to know".
Maintaining data security levels: Every
user must understand the sensitivity of their
data and treat them accordingly. Even if
technical security mechanisms fail or are
absent, every user must still maintain the
security of data.
Access Control Authorisation
 User accounts: for each user have unique user account and complex password in order to access to LSE IT resources
and services. HR and student information systems have basis of valid records that provides accounts. Any user is not in
either these systems. Must grantee access from via the appropriate staff or associate.
 Password: Formal process mange password issuing, strength requirements, changing and control. the IT Service Desk
mange password issuing for staff and IT Helpdesk mange password issuing for students.
 Access to Confidential, Restricted and Internal Use information: any authorized persons can access to information
that is require for his job or study. law and contract agreement with NHS Digital who determine these rules or the
Information Security Policy.. protect accessing to the information by use firewalls, network segregation and secure
log-on procedures. Public information have no access restrictions
 Policies and guidelines for use of accounts: LSE expect users to know LSE policies and guidelines , should
committee to them ,use them appropriately in the system
 Access for remote users: remote users need to take permitting from IMT to access to information. IMT do not
permitted to uncontrolled external access to any network device or networked system.
 Physical access control: in LSE campus you should have LSE Cards in order to Access to Comms Rooms
Access Control Methods
 Access Control Methods are the methods used for providing access control.
It prevent the collision or deal with it and ensures smooth flow of traffic on the network.
It is implemented at the data link layer of the OSI reference model.
 short list of access control methods used by default:
 user account privilege limitations.
 Windows share and file permissions to files and folders.
 server and workstation access rights. access rights.
Conclusion
LSE provide a lot of polies , guideline, Procedures
to users in order to protect and secure their
sensitive information as we study in Principles of
Information Security, security is the most important
process for each transaction in organization.
Slid share
– https://www.slideshare.net/BesssoEse/access-control-policy-176739390
Reference
– https://www.techopedia.com/definition/24840/information-systems-security-
infosec

More Related Content

What's hot

Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
Computer engineering company
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and toolsVibhor Raut
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards
Lillian Ekwosi-Egbulem
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controlsFITSFSd
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
Priya Diana Mercy
 
IT Policy
IT PolicyIT Policy
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaHanaysha
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
Parshant Tyagi
 
Dstca
DstcaDstca
Dstca
ajay vj
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
Sammer Qader
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Seurity policy
Seurity policySeurity policy
Seurity policy
Hari Sarda
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
Demand Metric
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
AKHIL969626
 
Infopercept_Technology_Risk_Review
Infopercept_Technology_Risk_ReviewInfopercept_Technology_Risk_Review
Infopercept_Technology_Risk_Reviewanjali bhalgama
 

What's hot (19)

Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
IT Policy
IT PolicyIT Policy
IT Policy
 
VPN security standards - Tareq Hanaysha
VPN security standards - Tareq HanayshaVPN security standards - Tareq Hanaysha
VPN security standards - Tareq Hanaysha
 
】=
】=】=
】=
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
 
Dstca
DstcaDstca
Dstca
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Seurity policy
Seurity policySeurity policy
Seurity policy
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud             Running head technology vulnerabilities in the cloud
Running head technology vulnerabilities in the cloud
 
Infopercept_Technology_Risk_Review
Infopercept_Technology_Risk_ReviewInfopercept_Technology_Risk_Review
Infopercept_Technology_Risk_Review
 

Similar to Access control policy

Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
Editor IJCATR
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challenges
sidraasif9090
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
Waseelsultan
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
techuniverso01
 
D017141823
D017141823D017141823
D017141823
IOSR Journals
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
IOSR Journals
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
Aamir Sohail
 
Shivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementShivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagement
shivanishuks
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
Jennifer Lopez
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
Jeffery Brown
 
Cyber Security Measures for LMS Platforms
Cyber Security Measures for LMS PlatformsCyber Security Measures for LMS Platforms
Cyber Security Measures for LMS Platforms
Rahul Pal
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
TakishaPeck109
 
ERP System Security Data Privacy and Governance
ERP System Security Data Privacy and GovernanceERP System Security Data Privacy and Governance
ERP System Security Data Privacy and Governance
Sean Badiru
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
Dr. Rosemarie Sibbaluca-Guirre
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptx
Kinetic Potential
 

Similar to Access control policy (20)

Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challenges
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
 
D017141823
D017141823D017141823
D017141823
 
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Network Security Policies
Network Security PoliciesNetwork Security Policies
Network Security Policies
 
Shivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagementShivani shukla_B38_KnowledgeManagement
Shivani shukla_B38_KnowledgeManagement
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Cyber Security Measures for LMS Platforms
Cyber Security Measures for LMS PlatformsCyber Security Measures for LMS Platforms
Cyber Security Measures for LMS Platforms
 
To meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, STo meet the requirements for lab 10 you were to perform Part 1, S
To meet the requirements for lab 10 you were to perform Part 1, S
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
ERP System Security Data Privacy and Governance
ERP System Security Data Privacy and GovernanceERP System Security Data Privacy and Governance
ERP System Security Data Privacy and Governance
 
Procedural Controls
Procedural ControlsProcedural Controls
Procedural Controls
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
Access Control and Maintenance.pptx
Access Control and Maintenance.pptxAccess Control and Maintenance.pptx
Access Control and Maintenance.pptx
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 

Access control policy

  • 1. summary of paper: Access Control Policy Nouf Alrajeh 216006315 Bsmah AL-sahlee 216004072 Spring course 2019-2020 School of Business – Information System Security
  • 2. Induction The London School of Economics and Political Science (LSE).Its public research university. The main campus is situated in central London. First our course information systems security, refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity. It also refers to Access controls, that it is goal to prevent unauthorized personnel from entering or accessing a physical and logical systems. Also it is ensuring security technology and access control policies are in place to protect confidential information. the access control policy outlines the controls placed on both physical access to the computer system (that is, having locked access to where the system is stored) and to the software in order to limit access to computer networks and data. Access control policies provide details on controlling access to information and systems, with these topics. That LES implements in networks, comms rooms, IT systems, data and authorised users.
  • 3. Policy LSE Policy Review and Development ensure that it remains appropriate in the light of any relevant changes to the law, organisational policies or contractual obligations. Additional regulations may be created to cover specific areas. Principles A principle which is a core requirement of information security for the safe utilization, flow, and storage of information. LSE provide for all employees, students and contracted third parties with on-site access to the information they need Penetration tests also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. That LSE’s use Access control method In order to protect assets in a company or corporation, security analysts and programmers can set access control to individual components on a computer. These components can be the operating system, programs or even hardware settings. Access control Authorization Authorization is to make sure the identity is who they say they are. We run into it daily both in digital (username or ID/password) Access control is the addition of extra authentication steps. proves they are who they say they are Policies, Codes of Practice, Procedures and Guidelines codes of practice, procedures and guidelines are published together and are available for viewing on LSE’s website. All staff, students and any third parties authorised to access LSE’s network or computing facilities are required to familiarise themselves cloud system LSE meet the access control provisions laid out in this policy. Access controls implemented in any cloud system is performed during the vendor assessment and implementation stages of any project
  • 4. Principles Generic identities: users of accounts must be recognisable in order for LSE to meet the conditions of its Internet Service Provider will never be used to access Confidential data or Personally Identifiable Information, including data supplied to LSE. Privileged accounts:privilege rights shall be restricted and controlled and not provided by default. Privileged accounts must not be used for standard activities; they are for program installation and system reconfiguration, not for program use. Least privilege and need to know: Access rights to both physical and logical assets. east privilege" states that one should only have access to what they need and nothing more. Extend this idea to "confidentiality of data" and you end up with "need to know". Maintaining data security levels: Every user must understand the sensitivity of their data and treat them accordingly. Even if technical security mechanisms fail or are absent, every user must still maintain the security of data.
  • 5. Access Control Authorisation  User accounts: for each user have unique user account and complex password in order to access to LSE IT resources and services. HR and student information systems have basis of valid records that provides accounts. Any user is not in either these systems. Must grantee access from via the appropriate staff or associate.  Password: Formal process mange password issuing, strength requirements, changing and control. the IT Service Desk mange password issuing for staff and IT Helpdesk mange password issuing for students.  Access to Confidential, Restricted and Internal Use information: any authorized persons can access to information that is require for his job or study. law and contract agreement with NHS Digital who determine these rules or the Information Security Policy.. protect accessing to the information by use firewalls, network segregation and secure log-on procedures. Public information have no access restrictions  Policies and guidelines for use of accounts: LSE expect users to know LSE policies and guidelines , should committee to them ,use them appropriately in the system  Access for remote users: remote users need to take permitting from IMT to access to information. IMT do not permitted to uncontrolled external access to any network device or networked system.  Physical access control: in LSE campus you should have LSE Cards in order to Access to Comms Rooms
  • 6. Access Control Methods  Access Control Methods are the methods used for providing access control. It prevent the collision or deal with it and ensures smooth flow of traffic on the network. It is implemented at the data link layer of the OSI reference model.  short list of access control methods used by default:  user account privilege limitations.  Windows share and file permissions to files and folders.  server and workstation access rights. access rights.
  • 7. Conclusion LSE provide a lot of polies , guideline, Procedures to users in order to protect and secure their sensitive information as we study in Principles of Information Security, security is the most important process for each transaction in organization.