Security and compliance

Assignment Help Basic Computer Science
Reference no: EM131095658

Security and Compliance

Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.

To gain a deeper appreciation for the relationship between security and compliance, consider the following scenario:

In an organization, managers are allowed to add users to Active Directory groups, which potentially grant them access to sensitive data on file shares. There are security policies and regulations that state that this access must be reviewed quarterly to ensure that only approved people have access to certain types of sensitive data. Sometimes, when people change jobs, their access may not be removed properly, so controls need to be put in place to demonstrate that the organization is doing a good job of meeting security and regulatory requirements.

Access requirements can change frequently, and at a large organization this can become very difficult to manage. When an employee moves from one job to another in the same organization, someone must change their level of access to certain resources. A manager should approve this change, and there should be quarterly metrics that show how managers are reviewing access levels for employees, and modifying access, as needed.

For this Discussion, in 250-400 words, address the following:

For the given scenario, recommend two policies that you would create for managers approving new access and for monitoring that access. In recommending these policies, make sure they are appropriate for the employees and are in accordance with the organizational policy for approving and monitoring access. Discuss the artifacts you would generate, as a part of these policies, to demonstrate compliance.

Reference no: EM131095658

Questions Cloud

Determine the percent regulation of the line : The sending-end Voltage, current, real and reactive powers, and the power factor.
What are the different types of listening styles : What are the different types of listening styles, and what style do you most closely identify with? Explain what your listening style is and what you have observed about how you listen.
Compare and contrast the four motivation theories : discuss the criticism of each theory. Which theory you identify with the most and why? You can identify with more than one, but it is not required. Development of idea and grammar.
Different types of correspondence in the workplace : You are working as the communications officer for a company located in a large office building with designated areas for employee breaks and lunches, located on each floor.
Security and compliance : Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.
Identify your current strategy for coping with stress : Write a summary defining stress and stressors. Explain the relationship between stress and physiological as well as psychological health. Discuss how you rated on the stress inventory - be specific. Then, identify the specific stressors in your lif..
Developing operational security metrics to meet business : Identity management is just one area of information assurance that needs to be improved in an organization. An information assurance professional needs to have a good understanding of how well all areas of security and information assurance are be..
Small consulting company is planning to make deposits : A small consulting company is planning to make deposits such that each one is 3% larger than the preceding one. What is the annual equivalent of this cash flow if the company makes 12 deposits and the interest rate is 8%? The first deposit is $7,000 ..
Find total reserves minus vault cash : Total Reserves minus vault cash equals- bank deposits with the Fed. excess reserves. currency in circulation.  required reserves

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sequential search question

Derive an exact formula in n (not big O) for the average number of target-to-element comparisons for successful searches on an array of size n, assuming that all possibilities of successful match are equally like.Show your work

  An opencv-based image retrieval program

This assignment can be carried out as individual or group projects. The maximum number of members in each group is 3. However, we expect more work and better results from a group with more people, and the responsibility of each group member should..

  Software developments is for developers to analyze

The goal of real world software developments is for developers to analyze, design, program, and test complete applications that solve the needs of the customer. The iLab exercises you have been given will give you practice with the specific programmi..

  Make a class for a singly linked circular list

Make a class for a singly linked circular list that has no end and no beggining. The only access on the list is a single reference, current, that can point to any link on the list.

  What is the value of alpha[4]

What is the value of alpha[4] after the following code executes? int alpha[5] = {0}; int j; alpha[0] = 2; for (j = 1; j

  Write a simple atm program in python

Write a simple atm program in Python. Ask the user to enter their account number, and then print the beginning balance.

  What is the best possible scenario

Q1. With regards to the order of hierarchy, what is the best possible scenario in terms of controlling risk?Q2. What is the hierarchy of control from most to least preferred?

  Discuss the protection mechanisms

Discuss the protection mechanisms you consider best suited for the technological innovation you have selected for your final project and how those mechanisms fit within the control continuum

  Determine the horizontal force developed on the board

The clamp provides pressure from several directions on the edges of the board.

  Write a program that implements message flow from top layer

It attaches its own header in front of the message (an arbitrary layer identifier of up to 64 characters), prints the new message on the standard output, and invokes the protocol function of the next lower-layer protocol.

  What is best way to prepare for course in computer science

What is the best way to prepare for a course in computer science, which is specifically fundamentals in web development? I will begin to take this course in the spring of 2016.

  What is the largest time out calculated

Compare the behaviors of the original and Jacobson/Karels algorithms for computing Time Out. Specifically, how many timeouts are encountered with each algorithm? What is the largest Time Out calculated? Use δ = 1/8.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd