appendix a network security flowcharts. user begins day user wishes to use an application user types...
TRANSCRIPT
APPENDIX ANetwork Security
Flowcharts
User begins day User wishesto use an
application
User typespassword forapplication
Usercompletes
a task
User logs outof
application
No
CORRECT
PASSWORD?
Yes
No
Yes DAY’S WORK
FINISHED ?
Userends day
Fig. 1: Share-Level Security Flowchart [A1]
The user must type a different password for each new use of a network resource. Essentially, the user is logging into a different computer on a peer-to-peer network each time.
User begins day User typespassword for
network
Usercompletes
a task
No
CORRECT
PASSWORD?
Yes
Yes
DAY’S WORK
FINISHED ?
No
Userends day
Fig. 2: User-Level Security Flowchart [A1]
User-level security simplifies the work system while it discourages unwanted access. This, however, is only possible if the user can log onto the entire network for the work day, and therefore only possible in a network such as a client-server network in which the server controls network access.
Userlogsout
REFERENCES
[A1] A. Kinney, “Network Security Flowcharts” [On-line presentation], [2005 21 Mar.] Available
http://elearning.algonquincolege.com/coursemat/kinneya/irMappendixa.pps.