Describe the access control mechanisms that are needed

Assignment Help Computer Engineering
Reference no: EM133696980

Homework: IP Access Controls & Security Mechanisms

Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The homework that you complete is based on the problems and potential solutions that similar companies may face. The end goal for the homework is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.

Description

Create the following section:

The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?

In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.

Complete the following section:

A. Access Controls and Security Mechanisms

1. For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.

2. Describe how the new expanded network can be protected through access control.

3. Describe SSO and VPN technology, and discuss whether they can be used in the company.

B. Name the document "CS651_FirstnameLastname_IP3.doc."

The template document should follow this format:

A. Security Management Document shell

1. Use Word

2. Title page

I. Course number and name

II. Project name

III. Your name

IV. Date

3. Table of Contents (TOC)

I. Use an autogenerated TOC.

II. This should be on a separate page.

III. This should be a maximum of 3 levels deep.

IV. Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

4. Section headings (create each heading on a new page with "TBD" as content, except for Week 1)

I. Part I: Introduction to Information Security

i. This section will describe the organization and establish the security model that it will use.

II. Part II: Security Assessment

i. This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.

III. Part III: Access Controls and Security Mechanisms

i. This section examines how to control access and implement sound security controls to ensure restricted access to data.

IV. Part IV: Security Policies, Procedures, and Regulatory Compliance

i. This section will focus on the protection of data and regulatory requirements that the company needs to implement.

V. Part V: Network Security

i. This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.

Reference no: EM133696980

Questions Cloud

Discussing neonatal mortality rates : A pediatrician is discussing neonatal mortality rates with new parents during a postnatal check-up.
Contribute to individuals health risks : During a community health seminar, a presenter discusses factors that contribute to an individual's health risks.
Discussing the coordination of various components : In a local school district, stakeholders are discussing the coordination of various components within the Whole School, Whole Community,
How can technology be used as an enabler and facilitator : How can technology be used as an enabler and facilitator of effective access controls and auditing?
Describe the access control mechanisms that are needed : For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
Examine the cash inflows and outflows from operating : Statement of Cash Flows: Examine the cash inflows and outflows from operating, investing, and financing activities.
Different business analytics techniques in business scenario : Use Business Analytics approaches to find trends and patterns in data from which to form a sustainable competitive advantage
What is heidi using in her communication : You would like to return the dress to your local store instead of shipping it back to the company. Is that correct?" What is Heidi using in her communication?
Why is the life cycle cost analysis critical in logistics : Why is the life cycle cost analysis critical in logistics and supportability analysis?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd