Describe how and why mandatory access control will be used

Assignment Help Computer Network Security
Reference no: EM131099705

You are asked to develop the Access Control Policy section of your Information Security Policy. One important aspect to always consider is the budget and don't be surprised if this changes during your process. Below are detailed breakdowns of what you need to include with each section, I hope this helps and feel free to ask any questions.

For this assignment, chapter 4 is a great resource as well as our class discussions.

User enrollment -remember to include your scenario

• What is user enrollment?
• How and why is this used?

Identification -remember to include your scenario

• What is identification?
• How and why identification is used to identify a user?
• Describe advance techniques used to identify a user?

Authentication - remember to include your scenario

• What is authentication?
• How and why authentication credentials are used to identify and control access to files, screens, and systems?
• Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Privileged and special account access - remember to include your scenario

• How and why privileged and special account access are used?
• Include group-based and user-assigned privileges.

Remote access - remember to include your scenario

• What is remote access?
• Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN)

Access Co

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to dictate access to that information.

Describe how and why mandatory access control will be used.

Describe how and why role-based access control will be used.

Remote Access

Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN).

Reference no: EM131099705

Questions Cloud

Stock market game outline and grading rubric : We will be playing a stock market game for approximately 4 weeks. Below are the rules of the game, which you should read carefully. Failure to meet all the requirements of the game will negatively impact your grade on the project.
Probability of completing the exam : 1. The time needed to complete a final examination in a particular college course is normally distributed with a mean of 79 minutes and a standard deviation of 8 minutes. Answer the following questions. a. What is the probability of completing the..
Compute the input capacitance of the circuit : compute the input capacitance of the circuit.
Bureau of transportation statistics website : The mean cost of domestic airfares in the United States rose to an all-time high of $385 per ticket (Bureau of Transportation Statistics website, November 2, 2012). Airfares were based on the total ticket value, which consisted of the price charge..
Describe how and why mandatory access control will be used : Describe how and why mandatory access control will be used. Describe how and why role-based access control will be used. How and why privileged and special account access are used?
Four-week moving average : Estimate demand for the next four weeks using a four-week moving average as well as simple exponential smoothing with a = .01. Evaluate the MAD, MAPE, MSE, bias and TS in each case. Which of the two methods do you prefer? Why?
What is the minimum tolerable value of rl : what is the minimum tolerable value of RL?
Determine the maximum allowable value of rc : We wish to design the common-base stage of Fig. 11.93 for a -3-dB bandwidth of 10 GHz.
What could have been done to prevent the incident : How the incident was mitigated and resolved, if it was. What standards, codes, or laws were violated that resulted in the incident and What could have been done to prevent the incident.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd