User management-data management-access control

Assignment Help Other Subject
Reference no: EM133236775

The four major areas one must  consider when collecting and writing security requirements documents are;

User Management, Data Management, Access Control and Auditing

However, select (1) of the following major areas and develop a report to management outlining and identifying the specific questions that would need to be asked and addressed in order to determine that adequate access controls are in place to mitigate the inherent risks associated with these major areas.

Please be sure that your response not only lists the specific questions to be asked but, that you also identify which type of access control (see list below) that each question is designed to assess.

Access Controls

  • Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.
  • Logical/technical controls: Control access to a computer system or network, such as a username and password combination
  • Hardware controls: Equipment that checks and validates IDs, such as a smart-card for or security token for multifactor authentication.
  • Software controls: Controls embedded in operating system and application software, such as NTFS permissions.
  • Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

Reference no: EM133236775

Questions Cloud

Illustrate winston present state of being dealing : How does this line illustrate Winston's present state of being dealing with the issues in Oceania?
Dying for education-little charlie : CBC Radio Documentary "Dying For An Education: Little Charlie" by Jody Porter: List what you learn about Chenie's life
Describe time when you felt particularly connected to nature : Describe a time when you felt particularly connected to nature. What are your views about larger environmental issues like climate change
Research on a recent network security breach : 1. Please conduct research on a recent network security breach (within the last year or two).
User management-data management-access control : The four major areas one must consider when collecting and writing security requirements documents are:
Why is a threat assessment so important to an organization : 1. Why is a threat assessment so important to an organization; both for its business and security benefit.
Othello about desdemona : What is Iago's reason for continuing to follow Othello? What warning does Brabantio give to Othello about Desdemona?
Outline pci-dss compliance in an e-commerce site : This assignment provides you an opportunity to identify an organization's need for PCI-DSS compliance and to analyze the way the process is executed. For this a
Is personal enrichment in knowledge about death : Is personal enrichment in knowledge about death and dying an important aspect of the training and is it important even beyond the nursing aspects

Reviews

Write a Review

Other Subject Questions & Answers

  Explain positive effects of the us presidential action

Discuss the positive and negative effects of the U.S. presidential action to re-impose quotas on China's exports of textile and clothing exported to the United States.

  How does the t-distribution differ from the normal deviation

How does the t-distribution differ from the normal standard deviation

  Discuss biographical information for each woman

Discuss Biographical information for each woman. What opinions each of the women might have on the role the women should play in society during their lifetimes.

  Discussion about the work of architecture

Research one painting, sculpture, or work of architecture. You may choose an example from the text or from an online, academic resource.

  Write a direct and concise thesis statement

Explore critical insights that were shared by your peers and/or your instructor on the topic chosen and begin your search for scholarly sources.

  Have political parties lost their power

Have political parties lost their power? Are interest groups more influential?

  What are the three es in environmental public policy

Each question should be 150 word response. What are the three "E"'s in Environmental Public Policy? How will a "green" economy replace a "brown" economy?

  Mr lee-a case study

Mr. Lee, an 84-year old man suffering from Stage IV lung cancer, is in the ICU, following surgery to remove the malignant mass in his brain.

  Armchair anthropology to participant observation fieldwork

Why was the shift from “armchair” anthropology to participant observation fieldwork important? Explain using the example of Malinowski’s ethnographic research in the Trobriand Islands.

  Should snomax and ice-minus be considered modified organisms

Should Snomax and Ice-minus be considered modified organisms and subject to precautions of releasing genetically modified organisms? Explain why or why not.

  Transfer gitmo prisoners to detention facilities

Most have been released without charges or turned over to other governments. In 2011, Congress specifically prohibited the expenditure of funds to transfer Gitmo prisoners to detention facilities in the continental United States, making it virtual..

  How nursing theory would be used within the classroom

Select one area , select a nursing theory and then apply the selected nursing theory to the area. For example, how could theory be used to select a research topic? How nursing theory would be used within the classroom or clinical setting? Be su..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd