Security and compliance

Assignment Help Basic Computer Science
Reference no: EM131095658

Security and Compliance

Security and compliance are interconnected in important ways. What happens if you have a policy, but you cannot assure compliance? There is no automated enforcement mechanism. You cannot be sure if policy is followed or not.

To gain a deeper appreciation for the relationship between security and compliance, consider the following scenario:

In an organization, managers are allowed to add users to Active Directory groups, which potentially grant them access to sensitive data on file shares. There are security policies and regulations that state that this access must be reviewed quarterly to ensure that only approved people have access to certain types of sensitive data. Sometimes, when people change jobs, their access may not be removed properly, so controls need to be put in place to demonstrate that the organization is doing a good job of meeting security and regulatory requirements.

Access requirements can change frequently, and at a large organization this can become very difficult to manage. When an employee moves from one job to another in the same organization, someone must change their level of access to certain resources. A manager should approve this change, and there should be quarterly metrics that show how managers are reviewing access levels for employees, and modifying access, as needed.

For this Discussion, in 250-400 words, address the following:

For the given scenario, recommend two policies that you would create for managers approving new access and for monitoring that access. In recommending these policies, make sure they are appropriate for the employees and are in accordance with the organizational policy for approving and monitoring access. Discuss the artifacts you would generate, as a part of these policies, to demonstrate compliance.

Reference no: EM131095658

Look for the actual location

The client says that this photo will help to clear him or her of the investigation. You need to determine the date, time, and location of the photo. Look for the actual loca

Elliptical-shaped land

You are given an elliptical-shaped land and you are asked to choose n arbitrary points on its boundary. Then you connect each point with every other point using straight lin

Discuss this problem as a class and draw up an action plan

Assume that you are part of a management team of a medium-size business that sells goods to consumers online. You know that your system was recently hacked, and that accounts

Class definition for queue

Write the class definition for this queue, in pseudocode or C++, which has the array, head and tail pointers as public data structures, and enque(int) and int dequeue() as t

Represents the amount of balloon animals

If he can make 3 balloon animals every 2 minutes, write an expression using the ceiling function or floor function that represents the amount of balloon animals that he crea

Deposit funds into the account or withdraws accounts

The Case of an E-Banking Information System Mr. Joshua, Director of the ZION Bank has Customers all over world. A customer may have one or more accounts in the Bank wide spr

Compare 2 alternatives from the point of view of performance

A critical region of data can be protected either by properly designed static schedules or by semaphore operations. Compare these two alternatives from the point of view of

Explaining the need for a business continuity plan

Write a draft memo to the president of the university explaining the need for a business continuity plan. Be sure to include your recommendations on how you would implement

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd