Reference no: EM131610393
Security and Compliance
Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.
To gain a deeper appreciation for the relationship between security and compliance, consider the following scenario:
In an organization, managers are allowed to add users to Active Directory groups, which potentially grant them access to sensitive data on file shares. There are security policies and regulations that state that this access must be reviewed quarterly to ensure that only approved people have access to certain types of sensitive data. Sometimes, when people change jobs, their access may not be removed properly, so controls need to be put in place to demonstrate that the organization is doing a good job of meeting security and regulatory requirements.
Access requirements can change frequently, and at a large organization this can become very difficult to manage. When an employee moves from one job to another in the same organization, someone must change their level of access to certain resources. A manager should approve this change, and there should be quarterly metrics that show how managers are reviewing access levels for employees, and modifying access, as needed.
For this Discussion, in two hundred and fifty to four hundred words, addressing the following:
For the given scenario, recommend two policies that you would create for managers approving new access and for monitoring that access. In recommending these policies, make sure they are appropriate for the employees and are in accordance with the organizational policy for approving and monitoring access. Discuss the artifacts you would generate, as a part of these policies, to demonstrate compliance.
What is the average receivables balance-receivables turnover
: What is the average receivables balance? What is the receivables turnover?
|
Calculate operating cash flows
: Assume that new project will annually generate revenues of $ 2400000. let's assume that firm's marginal tax rate is 33 percent. Calculate operating cash flows.
|
Coordinated sharing of remote files seems
: Between NIS, NFS, and DFS, the need for coordinated sharing of remote files seems to be well established. However, the principles and mechanisms.
|
What would happen in the given market
: What would happen in this market? Explain your answer and reconstruct the graph developed in question one to show this change.
|
Determine the security and compliance
: Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance?
|
Calculate the incremental income after taxes
: Fast Turnstiles Co. is evaluating the extension of credit to a new group of customers. Calculate the incremental income after taxes.
|
Available in security management
: Many security standards, best practices, and frameworks are available in security management, control objectives, process management, and enterprise development
|
Improve the appearance of a document
: Discuss the different types of graphing and formatting tools that can be added to microsoft word document.
|
Analyze the meaning or implications of the articles content
: Analyze the meaning or implications of the article's contents, as well as any flaws you find in the article. What could have made the article better?
|