Access controls procedure guide

Assignment Help Basic Computer Science
Reference no: EM132515544

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences.

Always Fresh management has asked you to develop procedures for changing any access controls.

The purpose of these procedures is to ensure that staff:

? Understand and document the purpose of each access control change request

? Know what access controls were in place before any changes

? Get an approval of change by management

? Understand the scope of the change, both with respect to users, computers, and objects

? Have evaluated the expected impact of the change

? Know how to evaluate whether the change meets the goals

? Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change.

The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved.

Ensure that your procedures include the following:

? Status or setting prior to any change

? Reason for the change

? Change to implement

? Scope of the change

? Impact of the change

? Status or setting after the change

? Process to evaluate the change

Required Resources

? Internet access

? Course textbook

Reference no: EM132515544

Questions Cloud

Calculate the total factory overhead applied to this job : Elite, Inc. has estimated total factory overhead costs of $900,000, calculate the total factory overhead applied to this job
Prepare production department flexible budget for month : Prepare the Production Department's flexible budget for the month. Prepare the Production Department's planning budget for the month.
Adverse selection and moral hazards : Explain how insurance companies try to reduce adverse selection and moral hazards.
What amount approximately will the market value of the stock : If the corporation issues a 4-for-1 stock split, what amount approximately will the market value of the stock fall to
Access controls procedure guide : Create a guide that security personnel will use that includes procedures for implementing an access control change.
Prepare the production departments flexible budget : Prepare the Production Department's flexible budget performance report for March, including both the spending and activity variances.
Communicate the business plan : Which details does this need to include for each party in terms of performance requirements and timeframe?
Consider before the issuance of the bond : What are the macro economy factors and others you will consider before the issuance of the bond?
Write essay on the decision making process : Write a three-page essay on the decision making process in a healthcare organization. Be sure to use APA style, include bibliographic citations and references.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the importance of cookies on security

What is the importance of cookies on security, page lifecycle management, and usability?

  Current place of employment

Consider your home, school, or current place of employment. What would you do to increase your organization's physical security? Try to think of the most cost-effective measures that would have the biggest impact.

  Ieee 754 32-bit floating points numbers to decimal values

Convert the following IEEE 754 32-bit floating points numbers to decimal values

  Create a file that contains your favorite movie quote

To discover a file's size, you can create a System.IO.FileInfo object using a statement such as the following, where FILE_NAME is a string that contains the name of the file:

  What is the purpose of combinational logic

a. What is the purpose of combinational logic? b. What is the function of logic converter?

  Operation of access control lists

Explain the purpose, limitation, and operation of access control lists (ACLs).

  Computing effective cpi of computer

Workstation uses a 15-MHZ processor with claimed 10-MIPS rating to execute a given programme mix. Suppose a one-cycle delay for each memory access. Compute effective CPI of this computer ?

  Forward error correction-automatic repeat request

Compare and contrast forward error correction (FEC) AND Automatic Repeat reQuest (ARQ). Explain various types of FEC and ARQ and in detail.

  Number of vertices with an odd degree

Since in an undirected graph, the number of vertices with an odd degree must be even, theremust be 2n vertices that can be paired up into n pairs. Why?

  Calculate the volume of liquid needed to fill the yard

"yard" is a traditional English container. It is 36 inches long, and can be approximated by a 4-inch diameter glass sphere attached to a conical section whose narrow end is 1 inch in diameter, and whose wide end is 6 inches in diameter.

  Different cryprtographic schemes and algorithms

What are the different methods used to exchange and distribute the keys involved in the different cryprtographic schemes and algorithms. Explain each

  Organization from the usage of apic-em

What are the key features and benefits to an organization from the usage of APIC-EM and what applications reside on the controller? How does it impact automation?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd