Describe the access control mechanisms that are needed

Assignment Help Computer Engineering
Reference no: EM133696980

Homework: IP Access Controls & Security Mechanisms

Throughout this course, you will be working with a scenario in which some basic background information is provided about a consulting firm. This scenario and information is typical in many companies today. You are tasked to select a company that you are familiar with that is facing a similar situation. The company can be real or fictitious, but the framework and problems that it faces should be similar. The homework that you complete is based on the problems and potential solutions that similar companies may face. The end goal for the homework is to analyze the problems that the company faces with respect to the upcoming audit and to provide guidance on how it can provide security for its infrastructure.

Description

Create the following section:

The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?

In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.

Complete the following section:

A. Access Controls and Security Mechanisms

1. For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.

2. Describe how the new expanded network can be protected through access control.

3. Describe SSO and VPN technology, and discuss whether they can be used in the company.

B. Name the document "CS651_FirstnameLastname_IP3.doc."

The template document should follow this format:

A. Security Management Document shell

1. Use Word

2. Title page

I. Course number and name

II. Project name

III. Your name

IV. Date

3. Table of Contents (TOC)

I. Use an autogenerated TOC.

II. This should be on a separate page.

III. This should be a maximum of 3 levels deep.

IV. Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

4. Section headings (create each heading on a new page with "TBD" as content, except for Week 1)

I. Part I: Introduction to Information Security

i. This section will describe the organization and establish the security model that it will use.

II. Part II: Security Assessment

i. This section will focus on risks that are faced by organizations and how to deal with or safeguard against them.

III. Part III: Access Controls and Security Mechanisms

i. This section examines how to control access and implement sound security controls to ensure restricted access to data.

IV. Part IV: Security Policies, Procedures, and Regulatory Compliance

i. This section will focus on the protection of data and regulatory requirements that the company needs to implement.

V. Part V: Network Security

i. This section combines all of the previous sections and gives the opportunity to examine the security mechanisms that are needed at the network level.

Reference no: EM133696980

Questions Cloud

Discussing neonatal mortality rates : A pediatrician is discussing neonatal mortality rates with new parents during a postnatal check-up.
Contribute to individuals health risks : During a community health seminar, a presenter discusses factors that contribute to an individual's health risks.
Discussing the coordination of various components : In a local school district, stakeholders are discussing the coordination of various components within the Whole School, Whole Community,
How can technology be used as an enabler and facilitator : How can technology be used as an enabler and facilitator of effective access controls and auditing?
Describe the access control mechanisms that are needed : For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
Examine the cash inflows and outflows from operating : Statement of Cash Flows: Examine the cash inflows and outflows from operating, investing, and financing activities.
Different business analytics techniques in business scenario : Use Business Analytics approaches to find trends and patterns in data from which to form a sustainable competitive advantage
What is heidi using in her communication : You would like to return the dress to your local store instead of shipping it back to the company. Is that correct?" What is Heidi using in her communication?
Why is the life cycle cost analysis critical in logistics : Why is the life cycle cost analysis critical in logistics and supportability analysis?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the important tasks for a web and data security

How can the administrator ensure that no important task in the ongoing management of security in networks is neglected?

  Discuss their main applicability as well as their advantages

Autonomous (intelligent) software agents are used in Artificial Intelligence to solve an increasing number of complex problems.

  Create a function that pulls a picture from a url

Create a function that pulls a picture from a URL and creates a thumbnail saved on your local machine.

  Determined that the existing risk management plan

determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed.

  What exception would be thrown if arithmetic were performed

What type of exception would be thrown if the following arithmetic were performed? double aValue = 0, bValue = 0; int result = (int) aValue / (int) bValue;

  Risks in the development of wearable pda

Assume an entrepreneur is proposing in order to design a wearable PDA which is unobtrusive and responds to the voice commands.

  Design a set of instructions to program the dma controller

Design a set of instructions to program the DMA controller. Specify the instruction formats, assuming ASC as the CPU.

  How are authentication and authorization alike

How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?

  Create a list of requirements for a smart highway

Create a list of requirements for a Smart Highway with at least five integrated Smart systems identified in your research with at least 40 requirements.

  Explain employment opportunity in your field of study

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be.

  Describe how online analytical processing can meet

Describe how online analytical processing can meet key information needs of Wheelies managers in their respective geographical areas.

  Examine advances in internet-based communication technology

Research the web and journal sites and identify one article that examines advances in Internet-based communication technologies and their impact.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd