Describe how and why mandatory access control will be used

Assignment Help Computer Network Security
Reference no: EM131099705

You are asked to develop the Access Control Policy section of your Information Security Policy. One important aspect to always consider is the budget and don't be surprised if this changes during your process. Below are detailed breakdowns of what you need to include with each section, I hope this helps and feel free to ask any questions.

For this assignment, chapter 4 is a great resource as well as our class discussions.

User enrollment -remember to include your scenario

• What is user enrollment?
• How and why is this used?

Identification -remember to include your scenario

• What is identification?
• How and why identification is used to identify a user?
• Describe advance techniques used to identify a user?

Authentication - remember to include your scenario

• What is authentication?
• How and why authentication credentials are used to identify and control access to files, screens, and systems?
• Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Privileged and special account access - remember to include your scenario

• How and why privileged and special account access are used?
• Include group-based and user-assigned privileges.

Remote access - remember to include your scenario

• What is remote access?
• Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN)

Access Co

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to dictate access to that information.

Describe how and why mandatory access control will be used.

Describe how and why role-based access control will be used.

Remote Access

Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN).

Reference no: EM131099705

Questions Cloud

Stock market game outline and grading rubric : We will be playing a stock market game for approximately 4 weeks. Below are the rules of the game, which you should read carefully. Failure to meet all the requirements of the game will negatively impact your grade on the project.
Probability of completing the exam : 1. The time needed to complete a final examination in a particular college course is normally distributed with a mean of 79 minutes and a standard deviation of 8 minutes. Answer the following questions. a. What is the probability of completing the..
Compute the input capacitance of the circuit : compute the input capacitance of the circuit.
Bureau of transportation statistics website : The mean cost of domestic airfares in the United States rose to an all-time high of $385 per ticket (Bureau of Transportation Statistics website, November 2, 2012). Airfares were based on the total ticket value, which consisted of the price charge..
Describe how and why mandatory access control will be used : Describe how and why mandatory access control will be used. Describe how and why role-based access control will be used. How and why privileged and special account access are used?
Four-week moving average : Estimate demand for the next four weeks using a four-week moving average as well as simple exponential smoothing with a = .01. Evaluate the MAD, MAPE, MSE, bias and TS in each case. Which of the two methods do you prefer? Why?
What is the minimum tolerable value of rl : what is the minimum tolerable value of RL?
Determine the maximum allowable value of rc : We wish to design the common-base stage of Fig. 11.93 for a -3-dB bandwidth of 10 GHz.
What could have been done to prevent the incident : How the incident was mitigated and resolved, if it was. What standards, codes, or laws were violated that resulted in the incident and What could have been done to prevent the incident.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cybersecurity elements to the water management

1. Applying the cybersecurity elements to the water management systems across the United States, which of the seven elements are most "impactful' as being central to enabling or supporting cyberattacks on this key aspect of our CI? Why

  Paper on entropy as it pertains to cryptography

Turn in a 3 page paper on Entropy as it pertains to Cryptography. The paper must discuss the relationship of Entropy to the likelihood that an attack can be successful, the formula for computing Entropy

  How a company-wide policy program could help the situation

Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

  Provide an overview of intellectual property law

Intellectual property law is a major issue facing organizations, and many organizations have been fined significant amounts for violations of intellectual property law. Provide an overview of intellectual property law

  Write the symbolic logic for the 3des decryption

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Is internet pose threats to traditional client server system

Hures is a leading human resource service provider. To keep up with growing business demands,it implemented its first information system in 1987 purchasing a main frame computer that servedso-called dumb terminals on the users' desktops.

  Boot process for a windows machine

What is the boot process for a Windows machine switches through several different modes. What are they, and how do they impact security?

  Process of generating an rsa key pair

List the smallest 10 numbers that are greater than 1000 and are candidates for being selected as the public key - can the number 1995 be selected as the public key? Justify your answer.

  What firewall setup would provide the firm both flexibility

Which firewall technologies should be deployed to (a) secure the internet-facing web servers (b) to protect the link between the web servers and customer database (c) to protect the link between internal users and the customer database? Be sure to..

  List of security activities or controls

List a security program in each level and provide a list of security activities or controls applied in these levels. Support your list with real world application data

  What would the subnet mask be in dotted decimal notation

Assume the address of a network host is 198.4.81.120/27. If the first address in the subnet range is the address of the network that address would be

  Question about communication

Communication is valuable; a main part of this is the ability to provide management the information they required, when they require it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd