Answer preview APA wordsAccess control processes and procedures are usually established as a way of safeguarding key resources and ensuring they only used as intended.

Access control processes and procedures are usually established as a way of safeguarding key resources and ensuring they only used as intended.

Select any one and respond back with about 100-150 words. Citation not required.

1) Access control processes and procedures are usually established as a way of safeguarding key resources and ensuring they only used as intended. At the federal level, key government agencies have put in place laws that are meant to secure key facilities from unauthorized access. This includes both physical access controls as well as one’ built-in information technology systems. Both the federal, state and local governments have in place different access control laws that act as guides for both public and private industries, as relates to the distribution of information and certain goods and substances to the general public.

A key aim of access control laws is to protect the privacy of people dealing with a different institution as well as government agencies. These laws are meant to ensure that the personal information of different people is not shared or accessed by unauthorized individuals. The federal HIPPA act, for example, requires the health and insurance agency to have in place sound access controls that limit the access to the key medical information of hospital clients (Bigelow, 2008). Access control laws are also meant to boost security for key government agencies, employees as well as the general public. Access control laws are also used as a basis for determining the liability that different parties may have in case there is a breach of security and certain resources or information ends up getting misused.

The state of Iowa, for example, has detailed firearm control laws that define licensing laws and the types of people that are allowed to carry firearms in the state. This limits the number of people that can access firearms and consequently reduces the possible cases of firearms being misused in the state. Iowa also has in place several other access control laws that are meant to restrict the distribution of certain industrial chemicals and substances.

2) national infrastructure is the primary security priority of any government. It require government agencies to create policies and implement security technologies that can provide a minimum level of security. There are several issues that necessitated the enactment of Federal, state and local government laws, and the establishment of regulations and policies for access control. The dynamic nature of current enterprise level networks continually opens up new attack opportunities for hackers. Government organizations are not exempt from these attacks and in some cases are considered high-value targets. Essential public sectors organizations like utilities, health care and social security related public records, and critical components of national telecommunications infrastructure are controlled, stored, or transmitted digitally. Consequently, attackers are not strictly financially motivated, but may also be committing acts of espionage, terrorism, and warfare. With so much more at risk,government agencies must be vigilant in their efforts to protect sensitive network resources and data. As a result, world governments have a renewed focus on access control security through the implementation of laws and regulations. In the U.S. there are multiple regulatory bodies such as the Department of Homeland Security (DHS) and the National Institute of Standards and Technology (NIST) that are responsible for drafting security guidelines, standards, and laws. Some of the regulations and guidelines that these entities have produced include FISMA, SCAP, FIPS, FDCC, and NIST Special Publication 800-53.

 

Answer preview Access control processes and procedures are usually established as a way of safeguarding key resources and ensuring they only used as intended.Access control processes and procedures are usually established as a way of safeguarding key resources and ensuring they only used as intended.

APA

158 words