Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment

Part 1: For the scenarios that follow, identify the data that would need to be protected. Recommend how you would implement one or more of the access controls for the given scenario. Justify your recommendations.

Scenarios:

1. A small construction company consisting of 12 computers that have Internet access.

2. A small advertising company consisting of 12 computers that have Internet access.

3. All employees communicate using smartphones.

4. A multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.

5. A defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail.

6. A military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using BlackBerry devices and e-mail.

Part 2: Select an access control model that best prevents unauthorized access for each of the five scenarios . Which types of logical access controls should be used in each scenario? Justify your recommendations.

1. Access control models:
2. Mandatory access controls
3. Discretionary access controls
4. Role-based access controls
5. Rule-based access controls
6. Content-dependent access controls
7. Nondiscretionary access controls
8. Access Controls
9. Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.
10. Logical/technical controls: Control access to a computer system or network, such as a username and password combination
11. Hardware controls: Equipment that checks and validates IDs, such as a smart-card for or security token for multifactor authentication.
12. Software controls: Controls embedded in operating system and application software, such as NTFS permissions.
13. Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92474867
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Management Information System

Individual projectusing proper apa format write 2 to 4

Individual Project Using proper APA format write 2 to 4 pages on the following • Search the Internet for an article where physical security failed • Propose and discuss possible changes in that organization's physical se ...

Characterizing the existing internetwork please respond to

"Characterizing the Existing Internetwork." Please respond to the following: • Explain the process of characterizing a new internetwork using the OSI model as its foundation. What tools would you use to assist in your pl ...

Youre working for a local coffee shop that offers free

You're working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public ...

Please respond to student 150-250 words do you agree or

Please respond to student 150-250 words ...do you agree or disagree One of the concepts that were interesting to me was the idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Inte ...

Write 2 page paper that discusses what policies were

Write 2 page paper that discusses what policies were missing in the particular case. Do additional research than what was provided in the text. Use APA format Cite your sources. Understand differences in framework compon ...

Write a 700- to 750 word paper on the protocols used in the

Write a 700- to 750 word paper on the protocols used in the OSI model. Address the following points: 1. How protocols are used to allow data communication to take place 2. How these protocols apply to health care organiz ...

Prepare a short talking points paper in which you discuss

Prepare a short "talking points" paper in which you discuss the following: 1. What role does innovation play in the cybersecurity industry? 2. Who are the major developers of cybersecurity related inventions? 3. How can ...

Answer the following question q1nbsp in todays

Answer the following Question : Q1.  In today's world, most college students will own at least one electronic device, such as a cell phone. Many students have multiple electronic devices. Microsoft Access includes a desk ...

Exercise 73 filling the human gapyou work for a medium

Exercise 7.3: Filling the Human Gap You work for a medium seized manufacturing company that has a well developed DR plan. The plan is well tested and the testing has revealed a serious personnel gap During a recovery, ke ...

In this assignment students will review the risk management

In this assignment, students will review the risk management framework (RMF). Provide an overview of the framework in a visual graphic format of the six steps in the process and provide a brief description of what happen ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As