Learning Objectives and Outcomes
- Identify what implementation method(s) can be used to incorporate multilayer access control
- Describe and how each method benefits multilayered access control.
Assignment Requirements
Read the worksheet named “Multilayer User Access Control” and address the following:
Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.
Required Resources
- Worksheet: Multilayer User Access Control (ws_multilayeraccesscontrol)
APA FormatNo plagirism
Multilayer User Access Control
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
www.jblearning.com Page 1
Implementing multiple layers in security is providing a defense-in-depth mechanism and therefore
stronger protection for the network and users. Multiple layers provide multiple road blocks for a user and
attacker. Having multiple controls in place before something can be accessed may be tiresome for a user;
however, the goal is to have the same effect on an attacker. If an attacker is able to find a hole and
access a company’s network, additional layers of security might stop the attacker from reaching other
systems, applications, or sensitive data.
In this exercise, you will learn about creating layers within the network.
Complete the table:
Access Control
Method Implementation Method(s)
How It Benefits Multilayered
Access Control
User Access Control
Profiles
Systems Access
Applications Access
File and Folder Access
Data Access