What role does the it leadership team in access control

Assignment Help Computer Engineering
Reference no: EM132022595

Question: As a team, write a comprehensive report regarding the use of access control in IT security. Teams are assigned during the residency.

Please address the following items:

1. Discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC).

2. Please make sure to provide examples. You might use one company to discuss all elements, or you can use separate companies.

3. What role does the IT leadership team in access control? What proactive actions can be taken to avoid a breach?

4. Please discuss management actions and activities to monitor access control. In your answer, consider hardware, software, cloud-based applications, and physical space.

Deliverables:

5. Day 1: Draft of the paper the paper that you will write. This includes an overview of the topics that you will discuss, which team member is assigned to do the work, and a starting point for your references.

6. Day 2: You will submit a 1,500-to-2,000-word report (APA Style) that includes the following sections:

• Title page (list all team members with Student ID numbers)

• Introduction

• Body

• Conclusion

• Recommendations

• References (at least 12 reputable sources)

• Written in APA Style, which means the following: title page, running head, page numbers, double-spaced, and reference page. Please note that any source cited in the reference page must be used in the paper itself as an in-text citation.

7. Day 3: Each team will have 10 minutes to make a presentation of their research. The PPT should include the names and Student IDs of all members. Please keep it high-level, as your time is limited. Class members can ask questions to earn extra credit. Please make sure to have your presentation on a jump drive. Given the size of the class, the presentations might begin on Saturday evening. Please note that missing any part of your team's presentation will result in a grade of zero. Also, please make sure audience is quite and respectful during all presentations. Please note that no student is released until Sunday at noon - leaving early will result in a grade reduction.

Reference no: EM132022595

Questions Cloud

What is the expected growth rate : what is the expected growth rate?
Company accounting earnings and economic earnings : What are the company's accounting earnings and economic earnings if the company sells all the properties that have risen in value and keep the others?
About as risky as the firm existing assets : These two projects are equally risky and about as risky as the firm's existing assets. What is the WACC?
What is st john roe : Total assets are $400,000, total account receivables are $60,000 and its debt-equity ratio is 1.5. What is St. John's ROE?
What role does the it leadership team in access control : What role does the IT leadership team in access control? What proactive actions can be taken to avoid a breach? Please discuss management actions and activities
Discuss management activities to monitor access control : Please discuss management actions and activities to monitor access control. In your answer, consider hardware, software, cloud-based applications.
Why do they allow businesses to use a different method : With IAS and FASB having a preference for one method over another, why do they allow businesses to use a different method?
Calculate portfolio new beta : Suppose you sell one of the stocks with a beta of 1.0 for $7,500 and use the proceeds to buy another stock whose beta is 1.85.
Identification and assessment of emerging technologies : Create two essay questions and associated answers. Topic: Wharton Managing Emerging Technologies - Identification and Assessment of Emerging Technologies.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How can we manipulate a maximal-flow network model

How can we manipulate a maximal-flow network model in order to specify all arcs between each pair of nodes as the changing variable cells in Solver?

  Information systems project

Information Systems Project

  List the hexadecimal code for each instruction

Consider the MARIE program below. a) List the hexadecimal code for each instruction. b) Draw the symbol table. c) What is the value stored in the AC when the program terminates?

  Write function build-tree for case when supply is a queue

Write function build_tree for the case when supply is a queue. Write function build_tree for the case when the input structure is a binary search tree.

  Make sure you correct the error before closing the program

If you haven't received an index error in one of your programs yet, try to make one happen. Make sure you correct the error before closing the program.

  Explain common uses for word processing applications

Explain common uses for word processing applications. Describe methods for inserting graphics, headers and footers, page numbers, and a table of contents.

  Create a single view iphone project using swift

Create a Single View iPhone project using SWIFT. Add a single .PNG image to the project asset catalog. Ensure that the application can support multiple orientations such as Portrait and Landscape.

  State the salient features of cray xts supercomputer

State in brief the salient features of Cray XTS supercomputer; draw a schematic diagram of the 2D torus system interconnect.

  Converting the sum of elements of array into octal format

Provided an array of ints named x and an int variable named total that has already been declared, write down some code which places the sum of all the elements of the array x into total.

  What are seven basic step in reviewing computer-based system

What is the preliminary review portion of an audit and why is it important? What are the seven basic steps in reviewing computer-based systems?

  How to write a python program

design a Python program that would prompt the user for the number of employees to be entered, and then prompt for employee name, followed by wage, followed by hours worked.

  Questionstatus your own position privacy in age of the

questionstatus your own position privacy in age of the internet and offer a defense for it. using ethical dialectical

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd