Controls for information systems within IT infrastructures

Assignment Help Basic Computer Science
Reference no: EM132415130

Look back at Assignments 1 through 3 and reflect on the work that you and your IT Security team did for LOTR. In these first three assignments, upper management and the Board of Directors for LOTR asked you to review and repair various access control issues. They have now asked that you create a presentation that will review all the changes that you have implemented to improve access control security. For this final presentation, they have asked for a high-level overview of the procedures you implemented to improve Network Access Control and the newly mapped access controls. They also want you to create a security checklist that can be used to conduct annual access control audits. Finally, they have asked you to make recommendations for three websites that include security RSS feeds to keep the company abreast of possible future security issues/exploits.

To complete Assignment 4, you have two options. You may either create a PowerPoint presentation or a video presentation that includes a high-level overview according to the following criteria

Summarize the access controls implemented at LOTR. Please provide a brief rationale for each of the recommended and implemented controls.

Create a security checklist that can be used to conduct annual access control audits.

Recommend three security websites with the ability to set up a corporate RSS feed. Explain why you selected these three sites. (Note: Please use three quality resources for this last step. Wikipedia and similar websites do not qualify as quality resources.)

Your assignment must follow these formatting requirements:

For PowerPoint submissions: Your PowerPoint presentation must be submitted as a functional, valid .PPT file through the Blackboard course shell. Include a title slide containing the title of the assignment, your name, the professor's name, the course title, and the date.

For video submissions: Please submit a valid link to your video in the Blackboard course shell. Your instructor must be able to see and hear you clearly in the video. In addition to your video link, you must also submit a written summary of the points you cover in the video. Think of your written summary as the "hand-out" you would submit to upper management if you were giving your video presentation in person. Include a title page containing the title of the assignment, your name, the professor's name, the course title, and the date. Please contact your instructor if you have any questions about the above requirements.

The specific course learning outcomes associated with this assignment are:

Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

Determine appropriate access controls for information systems within IT infrastructures.

Reference no: EM132415130

Questions Cloud

How americans feel about the causes of violence in america : How Americans feel about the causes of violence in America. Why is America so violent? Abstract should include the following: Why are you researching?
Usefulness and effectiveness of system security : Information Assurance is a way of assessing the usefulness and effectiveness of a system's security.
Contrast the actions that the bank of canada : Contrast the actions that the Bank of Canada would take to increase the quantity of money in the economy with the actions it would take to produce the opposite
Sustained periods of budget deficits or budget surpluses : Is there economic reasoning behind running sustained periods of budget deficits or budget surpluses? Briefly Explain.
Controls for information systems within IT infrastructures : Determine appropriate access controls for information systems within IT infrastructures. Examine methods that mitigate risk to IT infrastructure with integrity
Improvement of economic well-being : Does free trade contribute to the improvement of economic well-being? How does trade stimulate long-term economic growth? Explain.
What were the more important monetary policies : What were the more important monetary policies in place at the start of the 2000s decade and what were their purpose?
Eco 2013 principles of macroeconomics : Suppose that the empire of Arendelle is still in a recession. Queen Elsa now cannot stand the sight of you and has relocated you to the Central Bank
Discusses situational awareness : Discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd