Download presentation
Presentation is loading. Please wait.
Published byMark Floyd Modified over 9 years ago
1
APPENDIX A Network Security Flowcharts
2
User begins day User wishes to use an application User types password for application User completes a task User logs out of application No CORRECT PASSWORD ? Yes No Yes DAY’S WORK FINISHED ? User ends day Fig. 1: Share-Level Security Flowchart [A1] The user must type a different password for each new use of a network resource. Essentially, the user is logging into a different computer on a peer- to-peer network each time.
3
User begins day User types password for network User completes a task No CORRECT PASSWORD ? Yes DAY’S WORK FINISHED ? No User ends day Fig. 2: User-Level Security Flowchart [A1] User-level security simplifies the work system while it discourages unwanted access. This, however, is only possible if the user can log onto the entire network for the work day, and therefore only possible in a network such as a client-server network in which the server controls network access. User logs out
4
REFERENCES [A1] A. Kinney, “Network Security Flowcharts” [On-line presentation], [2005 21 Mar.] Available http://elearning.algonquincolege.com/coursemat/kinneya/irMappendixa.pps.http://elearning.algonquincolege.com/coursemat/kinneya/irMappendixa.pps
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.