Access control strategies

Assignment Help Basic Computer Science
Reference no: EM133181323

Access Control Strategies

In this assignment, you will develop strategies to protect the data and file systems of a fictitious software development company.The specific course learning outcome associated with this assignment is:

Determine an access control strategy based on existing documents.

Scenario

Independent Software Incorporated (ISI) is a small software development company with eight employees that work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI's coding development projects often encompass classified information and personally identifiable information (PII).

Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.

Develop at least three layered access security strategies that can be used to protect ISI's data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.

Explain a best practice process and procedures for implementing ISI's access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.

Describe the verification process that can be used to ensure that ISI's access control plan is effective, citing specific, credible sources that support your assertions and conclusions.

Explain how ISI's verification process will be maintained and updated in response to future changes in access requirements.

Reference no: EM133181323

Questions Cloud

Elaborate how to manage data within organisations : Elaborate how to manage data within organisations, teams and projects. Investigate techniques on how to collect, store, clean and manipulate data
Settle the administrative problems : The microeconomic thought by administrative financial matters incorporates; shopper interest and supply, opportunity cost, income and cost.
Write the regression equation : The 2021 monthly data below shows the number of TV ads run and the revenue of the XYZ Company.
What is meant by management development : Question 1: Explain orientation and its purpose. Question 2: What is meant by Management Development?
Access control strategies : Determine an access control strategy based on existing documents. Explain why ISI needs an access control plan and the goals of the plan,
Describe the marketing mix : Question 1: Describe the marketing mix and how airlines use each variable of the mix.
Discuss the continuing evolution of HTML : How can you keep up with the latest developments in HTML? How do you feel about the speed at which change is occurring
Advent of Information Technology : How information technology has created an ethical dilemma that would not have existed before the advent of Information Technology
Understanding the business environment and the economy : Understanding the Business Environment and the Economy - reflect on the requirements of job descriptions and tailor your interview answers to match

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd