How the new expanded network can be protected

Assignment Help Management Information Sys
Reference no: EM131756228

Assignment

The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control while others should be available to everyone. What access-control methods need to be employed for the various systems? How can the company protect the new consultant network while at the same time providing the protection of data that the stakeholders and customers require?

In addition, you have been asked to describe 2 access control mechanisms and consider if they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and if they can be used in the company.

Complete the following section:

• Access Controls and Security Mechanisms

o For each of the applications and systems that were described in IP 2, describe the access control mechanisms that are needed for each.
o Describe how the new expanded network can be protected through access control.
o Describe SSO and VPN technology, and discuss whether they can be used in the company.

Worked Example

Please refer to the following worked example of this assignment based on the problem-based learning (PBL) scenario. The worked example is not intended to be a complete example of the assignment, but it will illustrate the basic concepts that are required for completion of the assignment, and it can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific, and it should reflect your own approach to the assignment rather than just following the same outline.

Attachment:- Natasha-Manning-Redmond.rar

Reference no: EM131756228

Questions Cloud

Makes use of an american or european celebrity : Find an example of a Japanese ad that makes use of an American or European celebrity.
Does the process remain in control : Does the process remain in control? Does the data for March appear to be in control? Please support your with calculations.
Give some ideas or thoughts on other methods : Give some ideas or thoughts on other methods of attaining IT Quality apart from the ITIL framework.
Development stages as suggested by tuckman theory : Discuss the group development stages as suggested by Tuckman's Theory?
How the new expanded network can be protected : Access Controls and Security Mechanisms. Describe how the new expanded network can be protected through access control.
Evaluate the accuracy of dsm as an assessment tool : Do you support or oppose the continued use of DSM as the primary tool of psychiatric assessment?
Problem on educational incentives : Research and discuss the many different types of educational accounts/deductions available to taxpayers. Are QTPs available in your state?
Discuss what is predetermined manufacturing overhead rate : James Inc. estimates that its employees will utilize 400,000 machine hours during the coming year
Reflect on how the concept of global citizenship has shaped : GEN499 - Reflect on how the concept of global citizenship has shaped your identity, and think about how being a global citizen has made you a better person

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd