Describe administrative strategies related to the creation

Assignment Help Management Information Sys
Reference no: EM132240324

Assignment

Your recent endeavors to convince upper management at LOTR Experience not to cut the security budget have paid off. After hearing your rationale, management agreed to keep the existing budget intact.

As you have consistently proven your value to leadership, you and your team have now been asked to determine the best approach for mapping access controls. For this scenario, your goal is to assess the necessary requirements and provide guidelines that will sufficiently meet the organization's current needs.

Write a report to management in which you:

Analyze access control best practices and determine the best strategy for LOTR to implement. Provide three sites or links within the analysis that could be used as guidelines for your team.

After assessing the LOTR diagrams, define all subjects and objects. Explain how they relate to the access control strategy you recommend.

Outline how your team will approach the implementation phase of the access control strategy.

Describe administrative strategies related to the creation and deletion of new accounts.

Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The specific course learning outcomes associated with this assignment are:

Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

Determine appropriate access controls for information systems within IT infrastructures.

Diagnose risk from unauthorized access to IT systems through proper testing and reporting.

Reference no: EM132240324

Questions Cloud

Write a critical evaluation of the article : ISOL536-Write a critical evaluation of the article; make sure to include three to five key points that you thought were important.
What are your strenghts and weakness : AS an individual, what are your strenghts and weakness and how will they impact you as a PHD students?
Debate about the ending of capital punishment : Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations.
Which type of portable hard drive is best suited to needs : You will want to keep an archive of all your academic work so you can develop the best possible e-portfolio at graduation.
Describe administrative strategies related to the creation : After assessing the LOTR diagrams, define all subjects and objects. Explain how they relate to the access control strategy you recommend.
How the size of the organization impacts the octave method : plain how the size of the organization impacts the OCTAVE method utilized. Determine the factors that large organizations are most concerned with.
Find a customer success story of an organization : Find and briefly summarize a customer success story of an organization that integrated Open Text with its CRM system.
Evaluate the amount of information they disclose : Evaluate the amount of information they disclose and study their usage of the site's privacy settings, potential attacks on various aspects of their privacy.
Distinguish a digital signature and a digital certificate : What is the different between a digital signature and a digital certificate? Provide examples to support your answer.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How is innovation management related to technology

What does the discipline of Innovation Management involve? How is Innovation Management related to technology?

  Select at least three security vulnerabilities

Describe how often these measures should be performed and the order in which each should be performed.

  Determine the symmetric stress matrix

For steel, the following material data are applicable: Young's modulus, E = 207 GPa, and shear modulus, G = 80 GPa.- For the strain matrix at a point, shown below, determine the symmetric 3 X 3 stress matrix.

  Describe the security methods and controls

Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

  Identifies potential uses of cloud computing technology

Identifies potential uses of cloud computing technology, including the names of the cloud type and likely cloud computing services.

  Create a solution that would work with this data set

BUAD 2020: Create a solution that would work with this or another similar data set. Do NOT go into the data and modify it by hand.

  Identify the environmental impacts associated with mis

Identify the environmental impacts associated with MIS. Explain the three components of a sustainable MIS infrastructure along with their business benefits.

  Identify key components of customer service operational crm

He plans to use a BI system that would advise him on the school programs that he could retain and the programs that he can suspend to meet his budget target. Sketch a BI architecture diagram, mentioning possible BI tools application he can use and,..

  Describes the sourcing trends that are important for it

Report on outsourcing and insourcing by Deloitte Consulting describes the sourcing trends that are important for IT.

  Create a graphical representation of your architecture

Identify what types of technology will be involved in the architecture and explain the purpose of each technology.

  Technology that could prevent one''s identity

Describe why someone with a serious medical condition be concerned about researching his or her condition online, through medical search engines or pharmaceutical sites, for example.

  Discuss important elements of an information security plan

Identify, define, and describe the three or four most important elements of an Information Security Plan

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd