Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Case Study Expert

Assignment

Case Study: Technology & Product Review for Identity Governance & Administration

Case Scenario:

For this case study, our focus shifts to technologies and products used to implement the Identity Governance & Administration (IGA) business process and related security controls.

IGA is used to manage and mitigate insider threat. Insiders, because of their access to information and information resources (e.g. workstations, servers, networks), potentially have the opportunity and the means by which to steal intellectual property, commit fraud, and perform other types of mischief and mayhem (ranging from pranks to deliberate sabotage).

For our focus firm, Sifers-Grayson, access control and identity management have not been a serious concern ... or so their executives and managers thought. The majority of employees and managers are from the local area where there is a strong sense of community. The founders of the company belong to families who were among the original settlers for the county. They contribute heavily to local charities and youth organizations. They rely upon these connections to family and community when hiring and have a strong tradition of promoting from within.

The problem is that Sifers-Grayson's operations and sales have taken them into the vast geographies of the Internet and cyberspace. There is an emerging awareness among the engineering staff of the potential for outsiders to attack the company through its Internet connections. The thought that an insider might cause trouble for the firm is still hard for them to accept.

The company can no longer afford to depend upon social mores (pronounced "more-rays") and norms to protect it against the possibility of insider threats. The new contracts specifically require proper labeling of information ("data classification") and require control over access to government furnished information ("GFI"). This means that the company needs to change its culture and change its management processes.
The primary means for protecting against insider threats is to control insider access to information, information systems, and the information infrastructure. The two most basic processes used to protect against insider threat are (a) identity management and (b) access controls. Data classification is also an important protective process since it enables the use of the value or sensitivity of information when determining how and when to grant access. Privilege management is a third protective process, which is used to protect against the misuse of permissive access to software applications and operating system functions. The principle of least privilege is an important control over this permissive access. Finally, separation of duties is a key business process, which is used to prevent insiders from abusing access to information and information resources.

Research:

1. Review the weekly readings.

2. Choose an Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor's website and product information brochures.

3. Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about the characteristics of Identity Governance & AdministrationProducts.

Write:

Write a 3 page summary of your research. At a minimum, your summary must include the following:

1. An introduction or overview for the security technology category(Identity Governance & Administration).

2. A review of the features, capabilities, and deficiencies for your selected vendor and product.

3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.

4. A closing section in which you restate your recommendation for a product (include the three most important benefits).

As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g.protection, detection, prevention, "governance," confidentiality, integrity, availability, nonrepudiation, assurance, etc.). See the ISACA glossary.

Case Study, Writing

  • Category:- Case Study
  • Reference No.:- M92652702

Have any Question?


Related Questions in Case Study

Assignment - media evolution analysisassignment details

Assignment - Media Evolution Analysis Assignment details: Following our lectures and discussions in class, choose one media technology or phenomenon and research its historical trajectory. In particular, you should focus ...

Read gourmand and food- a fable longest amp darra read and

Read "Gourmand and Food- A fable" (Longest & Darr) a. Read and analyze the fable of Gourmand. b. How well does the allegory fit delivery of healthcare in the United States? c. What is and what should be the role of consu ...

Question - a colleague reaches out to you requesting

Question - A colleague reaches out to you requesting information on a client. You do not have a lot of information, as you have only interviewed the client one time. They are working with the client's spouse, who is also ...

Forensic investigation case study assignment -title

Forensic Investigation Case Study Assignment - Title: Clowning About Again Background In the state of Western Australia, it is illegal to access, own or distribute digital content relating to clowns. An allegation was be ...

Assignment -read the hefty hardware case study and answer

Assignment - Read the Hefty Hardware Case Study and answer the questions. Discussion Questions 1) Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both ...

Theory identification and analysisassignment overviewthree

Theory Identification and Analysis Assignment Overview Three of the four assignments in this course deal with the place of theory in social work practice. A solid understanding of the theoretical basis for understanding ...

Article review you are required to explain the

Article review, you are required to explain the circumstances surrounding this article. Also, be sure to address these questions in your response. Do you agree or disagree with accepting private funds for the agency and ...

Case analysis approachmethodology objectivesthe purpose of

Case Analysis Approach/Methodology Objectives The purpose of the oral presentation or written case analysis is to demonstrate that you can: Apply the theories and concepts of organizational behavior correctly to the spec ...

Safety and risk managementcritical review case analysisread

Safety and Risk Management Critical Review: Case Analysis Read the online article at the following link: Canberra construction company fined $1.1 million over death of truck driver by Gordon Taylor In an essay describe t ...

Clapham rail disastercritical analysis of disaster

Clapham Rail Disaster Critical analysis of disaster event Critical analysis of disaster response Recommendations for improving the effectiveness of response Linkage of disaster response to professional role

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As