40 likes | 47 Views
Learn about share-level and user-level security flowcharts for network access control. Understand the importance of correct passwords and logging out of applications to ensure data security.
E N D
APPENDIX A Network Security Flowcharts
User begins day No CORRECT PASSWORD? Yes User wishes to use an application User types password for application No Yes DAY’S WORK FINISHED ? User logs out of application User completes a task User ends day Fig. 1: Share-Level Security Flowchart [A1] The user must type a different password for each new use of a network resource. Essentially, the user is logging into a different computer on a peer-to-peer network each time.
User begins day No CORRECT PASSWORD? Yes User types password for network Yes DAY’S WORK FINISHED ? No User logs out User completes a task User ends day Fig. 2: User-Level Security Flowchart [A1] User-level security simplifies the work system while it discourages unwanted access. This, however, is only possible if the user can log onto the entire network for the work day, and therefore only possible in a network such as a client-server network in which the server controls network access.
REFERENCES [A1] A. Kinney, “Network Security Flowcharts” [On-line presentation], [2005 21 Mar.] Available http://elearning.algonquincolege.com/coursemat/kinneya/irMappendixa.pps.