Framework for information system security

Assignment Help Basic Computer Science
Reference no: EM132928802

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization's locations is operating with different information technologies and infrastructure-IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

Develop solutions to the issues that the specified location of IDI is facing.

Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.

Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.

Analyze the strengths and weaknesses in the current systems of IDI.

Address remote user and Web site user's secure access requirements.

Develop a proposed budget for the project-consider hardware, software, upgrades/replacements, and consulting services.

Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.

Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.

Reference no: EM132928802

Questions Cloud

How can relate investors expectation with the tax preference : How you can relate investors' expectations with "The Tax Preference Theory" and "Bird-in-the-hand Theory". Provide examples of firms listed in Bursa
Define the problem statement : What name is given to the network of secret routes and safe houses established in the United States in the mid-19th century to help slaves escape to the free st
How much dividends will pay : If the company follows a residual dividend policy, how much dividends will it pay or, alternatively, how much new stock must it issue?
Negative impacts of poorly conducted performance appraisals : Describe how a performance management system is different from an annual performance appraisal. What are some of the negative impacts of poorly conducted perfor
Framework for information system security : User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security.
Would recommend for CX to establish a self-funded ESI : Would you recommend for CX to establish a self-funded ESI? Why? You are a healthcare consultant and Corporation X (CX) approaches you for advice.
Design of a subsequent study : Which of the following refers to a small-scale study in which the results are only preliminary and intended only to assist in design of a subsequent study?
Would recommend sm to do so : SM tells you that it wants to establish a self-insured (a.k.a. self-funded) employer-sponsored insurance (ESI) plan. Would you recommend SM to do so?
Should commissioner move the program to managed care : The state's Medicaid program currently operates under fee-for-service, should the commissioner move the program to managed care? Why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd