Security Mechanisms
At the end of this class students should be able to:
Define logical access
Differentiate between physical access and logical access
Give examples of security measures
Describe the characteristics of an effective password
Logical vs Physical Access
Logical access controls refer to the policies, procedures and technical controls used in computer information systems. Physical access controls are used to control physical access; for example, the way that a lock controls access to a building or a room.
VIEW THE FOLLOWING LINK FOR MORE INFORMATION ABOUT LOGICAL ACCESS CONTROLS ALL SECTIONS AFTER THE SECTION LABELED 'CONSTRAINED USER INTERFACES'.
Effective Passwords
An effective password should possess the following characteristics.
Not obvious - so not easily guessed
length - longer passwords are harder to crack
Mixed case - using both upper and lower case letters makes the password more secure
Alphanumeric - comprised of both numbers and letters
READ MORE ABOUT EFFECTIVE PASSWORDS IN THE LINK INCLUDED.
Define the following terms and indicate how they are related to security of information systems.
Data security
Authentication
Encryption
Data corruption
Data integrity
These are for your own notes