Reference no: EM132900977
1. Assignment
Multifactor authentication (MFA) requires users to authenticate their identities with at least two factors to access a system or an application. More than half of companies around the world use MFA. For companies that have not implemented MFA, reasons cited include cost, IT effort, and problems with deployments leading to user "friction."
Some organizations deploy MFA only to executives because they have full access to sensitive information. Yet other organizations secure only some applications with MFA rather than all apps.
1. Do you agree that deploying MFA only to executives is a secure approach to access management? Why or why not?
2. Do you agree that requiring MFA for only some applications, regardless of user type, is a secure approach to access management? Why or why not?
Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students' views.
2. Assignment - Achieving Zero Trust
Learning Objectives and Outcomes
• Research and report on the zero trust model.
Zero trust is a security stance for networking based on not trusting any users, devices, or applications by default, even those that are already on the network.
The zero trust model uses identity and access management (IAM) as a foundation for an organization's security program.
For this assignment:
1. Research the zero trust model.
2. Write a report that describes the following:
• The purpose of zero trust and what differentiates it from other security models
• An overview of how zero trust works in a network environment
• How zero trust incorporates least privilege access through role-based access control (RBAC) and/or attribute-based access control (ABAC)
3. Assignment
Search the Internet for an article for examples of physical security threats.