Access location of person who is trying to

Access control and its relation to the above defined factors:-Access control to any organization is helpful to reduce the potential risks to the company by prevention of possible vulnerabilities attacking system.

Risk is nothing but an activity detecting threats exploiting vulnerability to damage assets. Threats might exist but if the system is less vulnerable ,thus a chance of very less risk .In a similar manner if the system is vulnerable and we have no or little threat, we have little riskAccess control eliminates Vulnerabilities by the following ways:• Encrypting URL content , data• Maintenance and creating time out sessions• Encrypting data in the database itself so that no one can fetch the data by using simple SQL injection queriesAccess control eliminates threats by following methods:• Verifying digital signatures in the web pages• Parsing each HTTPS requests in order to verify the previously logged in user.• Using the IP address of network physical location of person who is trying to authenticate.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

I'm Gerard!

Would you like to get a custom essay? How about receiving a customized one?

Check it out