Access control and it securities

Assignment Help Basic Computer Science
Reference no: EM133051345

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization's locations is operating with different information technologies and infrastructure-IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

Develop solutions to the issues that the specified location of IDI is facing.

Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.

Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.

Analyze the strengths and weaknesses in the current systems of IDI.

Address remote user and Web site user's secure access requirements.

Develop a proposed budget for the project-consider hardware, software, upgrades/replacements, and consulting services.

Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.

Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.

Prepare a side PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location

Reference no: EM133051345

Questions Cloud

Evaluate each company profitability and liquidity : Evaluate each company's profitability, liquidity and solvency. Your discussion should compare both companies to each other and to the industry average
ENGT5102 Mechatronic Systems Engineering and Artificial : ENGT5102 Mechatronic Systems Engineering and Artificial Intelligence Assignment Help and Solution, De Montfort University - Assessment Writing Service
Prepare the adjusting journal entry required at june : Specialist Mobile Phones Ltd issued 20,000 5-year $100 debentures with an interest rate of 6%. Prepare the adjusting journal entry required at 30 June 2020
Disaster and recover planning : Discuss the types of backup locations, per the text and Powerpoint presentation raeadings for the week.
Access control and it securities : Develop solutions to the issues that the specified location of IDI is facing. Address remote user and Web site user's secure access requirements.
Prepare the journal entries to record the transactions : September 6th Purchased on credit 5 lounges for $1,540 each (GST inclusive) Prepare the journal entries to record the transactions
Describe the options for the ce new employer : 1 A UK company has recently recruited a new Chief Executive (CE) who had for the last 20 years worked for a major competitor and had been a member of their defi
Question on privacy policy for environment : How does this apply to your personal information? Most of the privacy policies can be found at the bottom of the website. (Don't use facebook)
Analyze the company performance : 1. To analyze the company's performance for the year 2020 using ratios and analysis i.e.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are two laws that support employees privacy

Employers collect a substantial amount of personal information about their employees. What are two laws that support employees' privacy?

  Compare and contrast quantitative optimization

Compare and contrast (i) quantitative optimization-based design, and (ii) experience-based design.

  Review case of the gregor mendel

Gregor Mendel's early work laid the foundations for modern genetics. In one series of experiments with several generations of pea plants.

  Create portfolio related to work experience

Create a portfolio related to work experience in IT. May influence a hiring manager or company to hire you.

  What is multinational corporation

Close to 50% of the typical industrial and retail firm's assets are held as working capital. What is a multinational corporation?

  Understanding of package

List the differences between abstract and interface. Give me examples to demonstrate your understanding of package, abstract and interface.

  Information risk planning and management

One of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. Why are metrics required?

  What is project and what are its main attributes

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs?

  Disadvantages to they have compared to commercial banks

Savings Institutions, Credit Unions, and Finance Companies have been successful as "niche lenders," that is, specializing in one or more specific areas.

  Using a pld, develop an i/o port decoder

Using a PLD, develop an I/O port decoder that generates the following high-bank I/O strobes: 300DH, 300BH, 00B6H, and 00EEH.

  Mission and vision statements as well as the corporate

The new CEO has selected your consulting firm to give him/her an analysis of the organizational efficiency.

  Build access control role based matrix for company

Build an access control Role Based matrix for a company that you are familiar with their business operation and functions of managers,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd