CMP 312 - 3
CMP 312 - 3
is to safeguard assets, optimize the use of the organization’s resources, and prevent or
detect errors or fraud. These controls are designed to protect all of the components of
a system, including data, software, hardware, and networks. Controls are intended to
prevent accidental hazards, deter intentional acts, detect problems as early as possible,
Physical Controls
company’s facilities. Common physical controls include walls, doors, fencing, gates,
Access Controls
Access controls can be physical controls or logical controls. Both types restrict
acceptable login times and acceptable login locations. These controls can limit the
number of unsuccessful login attempts and they require everyone to log off their
computers when they leave for the day. In addition, computers are set to
automatically log the user off after a certain period of disuse. Note that logical
controls can be used for other purposes (such as checking calculations), not just for
Authentication confirms the identity of the person requiring access. After the person
which actions, rights, or privileges the person has, based on their verified identity.
Good control systems limit authorization to tasks needed to accomplish a person’s job.
use one or more of the following types of methods: something the user is, something
the user has, something the user does, or something the user knows.
Something the user is, also known as biometrics, is an authentication method that
divided into two categories: active and passive. Active methods of biometric
taking an action like speaking, placing a finger or eye in proximity to a scanner, and
other actions. This method requires enrolment into the biometric system. Examples of
and behavioural identification. For example, when a customer calls a bank, instead of
asking for account numbers or passwords, the bank’s agent only asks, “What can I do
for you today?” In the background, the system “listens” to the customer and compares
their voice to the voiceprint on file. Additionally, a mobile banking application can
track user behaviour such as typing cadence, swiping patterns, and even geographic
identification (ID) cards, smart ID cards, and tokens. Regular ID cards, or dumb cards,
typically have the person’s picture and often their signature. Smart ID cards have an
embedded chip that stores pertinent information about the user. (Smart ID cards used
for identification differ from smart cards used in electronic commerce. Both types of
cards have embedded chips, but they are used for different purposes.) Tokens have
embedded chips and a digital display that presents a login number that the employees
use to access the organization’s network. The number changes with each login.
Something the user knows is an authentication mechanism that includes passwords and
services, and we typically must choose complicated strings of characters to make them
convenience and security. For example, if passwords are 50 characters in length and
include special symbols, they might keep your computer and its files safe, but they
We have all bought into the idea that a password is sufficient to protect our data, as
no longer protect us, regardless of how unique or complex we make them. In fact,
security experts refer to passwords and PINs as a “double fail.” First, they are easily
stolen or hacked and easily forgotten. Second, they provide very poor security and a
strategies to obtain our passwords, no matter how strong they are. They can guess
them, steal them (with phishing or spear phishing attacks), crack them using brute
force computation, or obtain them online. (Brute force password cracking means that
discovered.)
authentication. This system is particularly important when users log in from remote