Security Mechanisms

At the end of this class students should be able to:

Define logical access

Differentiate between physical access and logical access

Give examples of security measures

Describe the characteristics of an effective password


Logical vs Physical Access

Logical access controls refer to the policies, procedures and technical controls used in computer information systems. Physical access controls are used to control physical access; for example, the way that a lock controls access to a building or a room.

VIEW THE FOLLOWING LINK FOR MORE INFORMATION ABOUT LOGICAL ACCESS CONTROLS ALL SECTIONS AFTER THE SECTION LABELED 'CONSTRAINED USER INTERFACES'.

http://securityv.isu.edu/isl/hk_acces.html

Effective Passwords

An effective password should possess the following characteristics.

Not obvious - so not easily guessed

length - longer passwords are harder to crack

Mixed case - using both upper and lower case letters makes the password more secure

Alphanumeric - comprised of both numbers and letters

READ MORE ABOUT EFFECTIVE PASSWORDS IN THE LINK INCLUDED.

Define the following terms and indicate how they are related to security of information systems.

Data security

Authentication

Encryption

Data corruption

Data integrity

These are for your own notes

Complete and Continue