Cyber Defense Magazine – July 2019

(Sean Pound) #1

How to manage your access control?


By Milica D. Djekic


Have you ever thought how two computers talk to each other while they are in a network? So many
network security experts would suggest you that those IT assets could use the well-developed
communications protocols in order to transfer the traffic through their wirings. Well, what’s the trick? The
communications between two or more devices being on the internet network would go via the set of rules
and every single device would contact the next one with the certain questions and its peer would reply
with some answers on. So, once the devices using the internet protocol confirm the situation is
appropriate for data exchange – they would establish the communications and start sending each other
the packets of the information. Apparently, the similar scenario is with the device and the hacking tools
being installed on another computing unit getting online. That hacker’s software would get capable to
access someone’s cyber infrastructure if there are provided some IP addresses or login details. In other
words, it’s all about the good access control! If you put some sort of the wall between your predator’s
computer and the victim’s one there are less chances that you would ban the access to any malicious
communications coming from the outside. For instance, you can always use the diverse methods of the
access control relying on some kinds of verification codes coming through e-mail, text message or phone
call, but would that help you remain safe while someone is trying to make a breach to your operating
system or the entire computing resources being on the web, so far? The main point here is how we could
control the access to any or some sensitive data storage or communications channel. In this review, we
would attempt to discuss a bit how the best practice in such an area could look like.

Free download pdf