Determine the security and compliance

Assignment Help Basic Computer Science
Reference no: EM131610393

Security and Compliance

Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.

To gain a deeper appreciation for the relationship between security and compliance, consider the following scenario:

In an organization, managers are allowed to add users to Active Directory groups, which potentially grant them access to sensitive data on file shares. There are security policies and regulations that state that this access must be reviewed quarterly to ensure that only approved people have access to certain types of sensitive data. Sometimes, when people change jobs, their access may not be removed properly, so controls need to be put in place to demonstrate that the organization is doing a good job of meeting security and regulatory requirements.

Access requirements can change frequently, and at a large organization this can become very difficult to manage. When an employee moves from one job to another in the same organization, someone must change their level of access to certain resources. A manager should approve this change, and there should be quarterly metrics that show how managers are reviewing access levels for employees, and modifying access, as needed.

For this Discussion, in two hundred and fifty to four hundred words, addressing the following:

For the given scenario, recommend two policies that you would create for managers approving new access and for monitoring that access. In recommending these policies, make sure they are appropriate for the employees and are in accordance with the organizational policy for approving and monitoring access. Discuss the artifacts you would generate, as a part of these policies, to demonstrate compliance.

Reference no: EM131610393

Questions Cloud

What is the average receivables balance-receivables turnover : What is the average receivables balance? What is the receivables turnover?
Calculate operating cash flows : Assume that new project will annually generate revenues of $ 2400000. let's assume that firm's marginal tax rate is 33 percent. Calculate operating cash flows.
Coordinated sharing of remote files seems : Between NIS, NFS, and DFS, the need for coordinated sharing of remote files seems to be well established. However, the principles and mechanisms.
What would happen in the given market : What would happen in this market? Explain your answer and reconstruct the graph developed in question one to show this change.
Determine the security and compliance : Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance?
Calculate the incremental income after taxes : Fast Turnstiles Co. is evaluating the extension of credit to a new group of customers. Calculate the incremental income after taxes.
Available in security management : Many security standards, best practices, and frameworks are available in security management, control objectives, process management, and enterprise development
Improve the appearance of a document : Discuss the different types of graphing and formatting tools that can be added to microsoft word document.
Analyze the meaning or implications of the articles content : Analyze the meaning or implications of the article's contents, as well as any flaws you find in the article. What could have made the article better?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Does this show that routers also need ip addresses

What is the difference between the two kinds of traffic when we think about source and destination IP addresses? Does this show that routers also need IP addresses?

  Inherent in the power of information

What are some potential problems and abuses inherent in the power of information?

  Describe a file system

Theory-long answer question. Describe how a file system could be implemented using a collection of inodes and some variant of a B tree. 500-1000 words. Be sure to consider: unallocated space, bad allocations, lost and found, root directories, s..

  Problem regarding the business intelligence tools

Identify a commercially available or open-source business intelligence tool and the type of business performance information it provides. Do not repeat an example that has been posted by another student.

  How long does it take him to stop the vehicle

A man is driving at the speed of 40 mph when he see an obstacle at distance 300ft ahead of the position. The driver applies the breaks and decelerates at 10ft/s2. How long does it take him to stop the vehicle? How long will the driver be when he f..

  What is country image

What is country image? Explain how it affects the screening process by international companies for potential markets and sites.

  Discuss how a cyber warrior can use a social networking

Discuss the vulnerabilities associated with four of the ten networks described in your readings. Make sure you identify the network, potential vulnerabilities, and what the result could be from an attack against it.

  Using wireshark note the ip address and tcp port number

Using wireshark note the IP address and TCP port number used by your client computer (source) to transfer the file to any FTP server?

  Problem regarding the types of televisions

A department store sells two types of televisions: Regular and Big Screen. The store can sell up to 90 sets a month. A Regular television requires 6 cubic feet of storage space, and a Big Screen television requires 18 cubic feet of space, and a ma..

  Creating a database to keep track of various aspects

10. Block-Bluster, a local video renting shop, is considering creating a database to keep track of various aspects of the store. Impressed by your MIS knowledge and skills, the management has decided to hire you to design a conceptual schema first.

  Draw the resource allocation graph

Suppose further that process 1 holds one unit of resources B and C and is waiting for a unit of A; that process 2 is holding a unit of A and waiting on a unit of B; and that process 3 is holding one unit of A, two units of B, and one unit of C. Dr..

  How many tcp connections a second can c make

This solves the problem of old data accepted as new; however, TIME WAIT also serves the purpose of handling late final FINs. What would such an implementation have to do to address this and still achieve strict compliance with the TCP requirement ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd