Summarize the access controls implemented at lotr

Assignment Help Management Information Sys
Reference no: EM132260314

Look back at Assignments 1 through 3 and reflect on the work that you and your IT Security team did for LOTR. In these first three assignments, upper management and the Board of Directors for LOTR asked you to review and repair various access control issues.

They have now asked that you create a presentation that will review all the changes that you have implemented to improve access control security.

For this final presentation, they have asked for a high-level overview of the procedures you implemented to improve Network Access Control and the newly mapped access controls.

They also want you to create a security checklist that can be used to conduct annual access control audits. Finally, they have asked you to make recommendations for three websites that include security RSS feeds to keep the company abreast of possible future security issues/exploits.

To complete Assignment 4, you have two options. You may either create a PowerPoint presentation or a video presentation that includes a high-level overview according to the following criteria

Summarize the access controls implemented at LOTR. Please provide a brief rationale for each of the recommended and implemented controls.

Create a security checklist that can be used to conduct annual access control audits.

Recommend three security websites with the ability to set up a corporate RSS feed. Explain why you selected these three sites. (Note: Please use three quality resources for this last step. Wikipedia and similar websites do not qualify as quality resources.)

Your assignment must follow these formatting requirements:

For PowerPoint submissions: Your PowerPoint presentation must be submitted as a functional, valid .PPT file through the Blackboard course shell. Include a title slide containing the title of the assignment, your name, the professor's name, the course title, and the date.

For video submissions: Please submit a valid link to your video in the Blackboard course shell. Your instructor must be able to see and hear you clearly in the video.

In addition to your video link, you must also submit a written summary of the points you cover in the video. Think of your written summary as the "hand-out" you would submit to upper management if you were giving your video presentation in person.

Include a title page containing the title of the assignment, your name, the professor's name, the course title, and the date. Please contact your instructor if you have any questions about the above requirements.

The specific course learning outcomes associated with this assignment are:

Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

Determine appropriate access controls for information systems within IT infrastructures.

Reference no: EM132260314

Questions Cloud

What role will technological advancement play : What role will technological advancement play in the future evolution of firms and industries? Create a graph that illustrates the effect of technological.
Evaluate impact of Nazi anti-Semitic law on Jewish community : Assignment Task - Holocaust Research/Essay, Kirrawee High School, Australia. Evaluate the impact of Nazi anti-Semitic laws on the Jewish community in Germany
Describe a personal experience of spoofing : Describe a well-known example or personal experience of spoofing (please do not include specific names of organizations or people).
What options are there for subscribing to a car : What options are there for "subscribing" to a car instead of owning one? How about for a bicycle?
Summarize the access controls implemented at lotr : Summarize the access controls implemented at LOTR. Please provide a brief rationale for each of the recommended and implemented controls.
Develop a new erm for their current organization : Would you recommend that the base their new ERM on PM2 Risk Scorecard or ISO 31000? Explain why you would choose one over the other.
Determine the requirements of the new internet-accessible : Determine the requirements of the new Internet-accessible SRS software system.
How was the organization impacted : Conduct a web search on organizations that were affected by Hurricane Katrina. How was the organization impacted? What losses did it suffer?
Define the pathophysiology of the disease in detail : Write a 300- 500 words discussion that describes the pathophysiology of the disease in detail, listing at least two (2) nursing diagnoses and current treatment.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss three major challenges that typically users face in

discuss three major challenges that typically users face in building andor using information systems and elaborate the

  Identify which sdlc step is associated with project

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project .

  Description of accounting information system

Description of Accounting information system - What is an accounting information system? How does it differ from other information systems within an organization?

  Provides gives overview of business intelligent environment

Provides gives an overview of a Business Intelligent environment. Describe two of the components of this environment and highlight the relevance of that component to the BI environment. A suitable answer will be two paragraphs with at least fiv..

  Define the sdlc model and methodology

Define the SDLC model and methodology and identify which SDLC step is associated with each project component.

  Analyze why you believe dos and ddos attacks have evolved

Analyze why you believe DoS and DDoS attacks have evolved in recent years to be more than simple annoyances to more targeted attacks involving extortion and other crimes. Explain the effect that you believe this has on large corporations and descr..

  Employ an action research methodology

You will employ an Action Research Methodology to complete their selected project. This methodology can be used for new development.

  Newer communications technologies

What are some of the pros and cons of using newer communications technologies when communicating with organizational workforces in different geographical areas?

  Design a technology to improve community-building

Design a technology to improve community-building in college dormitory life. All work proofs must be hand-drawn with the exception of prototypes.

  How would you decide which one should be addressed first

Propose a scenario where two specific maintenance requests are competing for the attention of the system administrators and technical support staff.

  Building a relational database for inventory management

Building a Relational Database for Inventory Management

  Write and post client and server program to implement

Write and post client and server program to implement a reliable File Transfer Protocol (FTP) using UDP.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd