Presentation is loading. Please wait.

Presentation is loading. Please wait.

APPENDIX A Network Security Flowcharts. User begins day User wishes to use an application User types password for application User completes a task User.

Similar presentations


Presentation on theme: "APPENDIX A Network Security Flowcharts. User begins day User wishes to use an application User types password for application User completes a task User."— Presentation transcript:

1 APPENDIX A Network Security Flowcharts

2 User begins day User wishes to use an application User types password for application User completes a task User logs out of application No CORRECT PASSWORD ? Yes No Yes DAY’S WORK FINISHED ? User ends day Fig. 1: Share-Level Security Flowchart [A1] The user must type a different password for each new use of a network resource. Essentially, the user is logging into a different computer on a peer- to-peer network each time.

3 User begins day User types password for network User completes a task No CORRECT PASSWORD ? Yes DAY’S WORK FINISHED ? No User ends day Fig. 2: User-Level Security Flowchart [A1] User-level security simplifies the work system while it discourages unwanted access. This, however, is only possible if the user can log onto the entire network for the work day, and therefore only possible in a network such as a client-server network in which the server controls network access. User logs out

4 REFERENCES [A1] A. Kinney, “Network Security Flowcharts” [On-line presentation], [2005 21 Mar.] Available http://elearning.algonquincolege.com/coursemat/kinneya/irMappendixa.pps.http://elearning.algonquincolege.com/coursemat/kinneya/irMappendixa.pps


Download ppt "APPENDIX A Network Security Flowcharts. User begins day User wishes to use an application User types password for application User completes a task User."

Similar presentations


Ads by Google