What are the pros and cons of methods such as single sign-on

Assignment Help Management Information Sys
Reference no: EM13784755

In a two- to three-page essay, design and describe a remote access control policy that details the requirements for establishing secure access between remote offices located in Atlanta, San Francisco, Chicago, and Dallas. In order to communicate between these offices, you need to set up an information transfer system, including communication that is secure on both ends. Remember that securing remote communications may span two or more of the seven domains of a typical IT Infrastructure. Use this model to help guide you on the various aspects of the control policy.

Considerations:

Consider whether to use a wide area network (WAN) or virtual private networking links.

Consider the security kernel for the specific environment; outline the security kernel when creating your essay.

Consider the physical and logical access controls when designing remote access.

Passwords should follow the best practice guidelines to strengthen security.

What are the pros and cons of methods such as Single Sign-On (SSO)? Weigh the user benefits to security risks when considering the remote access methods.

Submission Requirements:

Submit your answers in a two- to three-page Microsoft Word document using APA style. Include references as necessary. Submit the document to your instructor as an attachment through the Questa Learning Plan.

Use 12-point, Arial font, and double spacing in your Microsoft Word document.

Reference no: EM13784755

Questions Cloud

Behavioral health and community : Behavioral Health and Community.
Current liability and a long-term liability : What is the difference between a current liability and a long-term liability? How are liabilities taken into account when analyzing an organization's current financial position?
Explain why jails play an important role : Explain why jails play an important role in the criminal justice system. Discuss the role of community-based corrections programs associated with jails and prisons. Describe violent behavior that occurs in jails and prisons
Do you think us equity markets : Show and demonstrate your ability to provide reasoning for your response to discussion questions.
What are the pros and cons of methods such as single sign-on : What are the pros and cons of methods such as Single Sign-On (SSO). Weigh the user benefits to security risks when considering the remote access methods.
Aircraft component project-what is the scope of the project : What is the scope of the project? What does it deliver? Describe how the project tasks and work are organized. What are the weak points with using bar charts for planning this project? It has received an order from an aircraft manufacturer to design ..
Models for making moral decisions discussed : Describe an ethical issue in your own area of study and provide a moral response. Analyze how at least two moral theories might respond to the issue.
Creative processes underlying each individual work : A critique of their ideas: could they have done anything differently? How did their work fit into the existing framework of understanding in their field, and how did it advance further understanding of the field?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd