Access Denied: ACL Research
Begin your paper by describing an access control list for computing systems, servers, network equipment, and entry to restricted areas. Then, discuss implementation of some form of two factor authentication. This could be smart card, smart chip, biometric, or even key pads and cipher locks. Analyze the strength of these processes as well as their drawbacks. Conduct thorough research and use your research to discuss the various different access control mediums available in addition to your selected method. Disclose why you believe yours would be successful.
Your paper should be 2-3 pages in length
Include at least two scholarly references in addition to the course textbook.
APA Format Guidelines