Beau
Balance Between Restricting and Enabling Access
A balance needs to be struck between restricting and enabling access for legitimate users because security should be implemented where practicable to comply with local data protection regulations, such as the United Kingdom General Data Protection Regulation (UK GDPR), without impeding business …
Read MoreMethods of Identity Management and Authentication
Identity Management
Single Sign-On (SSO) allows users to sign into multiple platforms with a single set of login credentials. The common SSOs are Google, GitHub, Microsoft, LinkedIn, Facebook. SSO uses what the user knows. Signing in is now convenient because a user only needs to remember one …
Read MoreAccess Control Techniques
Discretionary Access Control
The Discretionary Access Control (DAC) model is the least restrictive whereby it does not rely on the administrator to set roles, thus the power is distributed to the owner, i.e. the person who created the object which could be a file or directory. The owner has full …
Read MoreTypes of Access Control From a Physical Logical and Administrative Perspective
Physical perspective
Access control from a physical perspective is a security system that grants or denies people access into a building or an area. Only authorised employees and visitors are allowed into the premises. Credentials can be verified usually with what the person has which is a staff …
Read MoreRole of Access Control
Role of access control
Access control is a set of protocols that acts as gatekeepers to blocks unauthorised users and devices from accessing a private network, or give restricted access to external users. The policies prevent unwanted intruders from entering the network or data from leaving. Access …
Read MoreEffectiveness of Different Transmission Methods
Half duplex vs Full duplex
Half duplex can communicate in only one direction at a time. E.g. a radio (walkie-talkie) whereby
only one device is allowed to send data and the other devices can receive.
The advantage of using a half duplex is it is used in Wi-Fi as evidenced in the download and …
Principles of Signal Theory
Signal Theory is the study of how information is transmitted between two or more entities, also known as peers, in a communication system. The digital signals are a series of pulses made of denoting on and off or 1’s or 0’s which can be digital or analog waves. Digital signal processing (DSP) is a …
Read MoreMain Elements of Data Communication Systems
Data communication happens between two computers: a client and a server. The main elements of data
communication systems consist of a sender, receiver, protocol, message,and transmission medium.
A sender and a receiver are an endpoint device, a client or a server. This could be a computer,
mobile …
Protocols Used to Govern and Control Data Transmission
POP3 is the third version of the Post Office Protocol, used to receive emails. It is the language that an email application on the host computer uses to communicate with the email server on port 110 using TCP connection to download the user’s email on the user’s computer and remove it from the …
Read MoreHow Networks Communicate
When networks communicate, it allows for data flow between endpoint and intermediary devices over the wire or wirelessly using software protocols. An endpoint device could be a computer; for an intermediary could be routers and switches. Software protocols are rules that govern all data …
Read MoreUse and Features of Different Types of Communication Devices
A communication device is a physical device that can transmit to another communication device an
analog or digital signal over the wire or wirelessly. This can be a user interface such as a
telephone, smartphone, or laptop or an intermediary such as a modem, router or switch.
A router is a …