Changing access controls can have some undesirable effects

Assignment Help Basic Computer Science
Reference no: EM132637349

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

 Understand and document the purpose of each access control change request

 Know what access controls were in place before any changes

 Get an approval of change by management

 Understand the scope of the change, both with respect to users, computers, and objects

 Have evaluated the expected impact of the change

 Know how to evaluate whether the change meets the goals

 Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

 Status or setting prior to any change

 Reason for the change

 Change to implement

 Scope of the change

 Impact of the change

 Status or setting after the change

 Process to evaluate the change

Reference no: EM132637349

Questions Cloud

How much cash can kayapa plan to collect from accounts : How much cash can Kayapa plan to collect from accounts receivable during July? Kayapa Corporation is a retailer whose sales are all made on credit.
Question - Prepare a trial balance : Question - Prepare a trial balance - Boilermaker House Painting Company incurs the following transactions for September
How much is the budgeted cash disbursements on purchases : How much is the budgeted cash disbursements on purchases of Kayapa for July? Kayapa Corporation is a retailer whose sales are all made on credit.
Haber-bosch process : In the flow diagram highlight the reactions which govern the production and explain the type of reactions and why they are necessary
Changing access controls can have some undesirable effects : Changing access controls can have some undesirable effects. provide mechanisms to reverse changes if they have unexpected consequences.
What the budgeted peso value of kayapa inventory : What the budgeted peso value of Kayapa's inventory on August 31 will be? Kayapa Corporation is a retailer whose sales are all made on credit.
Find the volume of the solid generated : How to find the volume of the solid generated by revolving the lemniscate r2=a2cos2theta about y-axis?
Prepare the income statement Tiffany for the year ended : The company also had retained earnings of $20,000 at the beginning of the year. Prepare the income statement Tiffany for the year ended
Contingency planning is risk mitigation process : Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual'.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  New source address was installed after destination address

the bridges' learning algorithm is to install (or update) the new {source address, interface} entry before searching the table for the destination address

  Analyze and visualize the dataset provided

ITECH1103 - Big Data and Analytics - using the visualizations created discuss the findings from the data set. In this discussion you should explain what each

  Cache miss during write using write through policy

a) Write buffer in MMU helps to avoid controller stall upon cache miss during write using write through policy.

  Speed up the process of server administration

Templates often speed up the process of Server administration, explain how would you make sure you get as much benefit of your GP templates as possible.

  Repo bonds to non-bank financial firms

If the Fed wishes to raise the equilibrium federal funds rate up to the top end of the target range, will it repo or reverse repo bonds to non-bank financial

  Indicate the designation of each edge

Assume that we have run Depth-First-Search (DFS) on a directed graph G(V, E) and obtainedthe following discovery and finishing times for each vertex in V

  What you learned from visiting the website

Find total of 4 websites that are related to modeling policy. What you learned from visiting the website. Anything else what you want to describe.

  Systematic risk and not total risk is important

If it is true, she was wondering, why do we contend that only systematic risk and not total risk is important?

  Threads main view

There are two basic ways to tell if a network or system is under attack. These are with intrusion-detection systems (IDSs) and intrusion-protection systems.

  How does controlled crisis communication

What was different? How does controlled crisis communication affect DRP execution?

  Developing and enhancing software for internal use

Your software development company wants to continue developing and enhancing a software for internal use.

  Nosql databases in work environment

In this forum, describe your current organization or school (industry, size, processes, etc...) and discuss whether/how it could take advantage of NOSQL databases.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd