Describe how and why mandatory access control will be used

Assignment Help Computer Network Security
Reference no: EM131099705

You are asked to develop the Access Control Policy section of your Information Security Policy. One important aspect to always consider is the budget and don't be surprised if this changes during your process. Below are detailed breakdowns of what you need to include with each section, I hope this helps and feel free to ask any questions.

For this assignment, chapter 4 is a great resource as well as our class discussions.

User enrollment -remember to include your scenario

• What is user enrollment?
• How and why is this used?

Identification -remember to include your scenario

• What is identification?
• How and why identification is used to identify a user?
• Describe advance techniques used to identify a user?

Authentication - remember to include your scenario

• What is authentication?
• How and why authentication credentials are used to identify and control access to files, screens, and systems?
• Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Privileged and special account access - remember to include your scenario

• How and why privileged and special account access are used?
• Include group-based and user-assigned privileges.

Remote access - remember to include your scenario

• What is remote access?
• Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN)

Access Co

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to dictate access to that information.

Describe how and why mandatory access control will be used.

Describe how and why role-based access control will be used.

Remote Access

Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN).

Reference no: EM131099705

Discuss the key data protection points that must be taken

As the CIO of a company engaged in business today, one of the main areas of focus is data protection. Discuss the key data protection points that must be taken into consider

Define the information security governance and management

Define the information security governance and management tasks that senior management needs to address.Describe the outcomes and the items that will be delivered to the organ

Why you think information security is important

You are applying for a job as the Chief Information Officer at Nitro Hardware Company. The application requires you to compose a report on why you think information security

Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality,

Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your read

Analyze any potential physical vulnerabilities and threats

You are the Information Security Officer for a small pharmacy that has recently been opened in the local shopping mall. Identify and analyze any potential physical vulnerabili

Advantage of partial order on the empirical relation system

What is the advantage of having a partial order on the empirical relation system and  Why is the number of decisions plus 1 an important method for calculating McCabe's cyclam

Discuss some of the security threats a company could face

In 1 - 2 pages, discuss some of the security threats a company could face when adding wireless access points (WAPs) to its network. How could the company reduce these risks

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd