Describe how and why mandatory access control will be used

Assignment Help Computer Network Security
Reference no: EM131099705

You are asked to develop the Access Control Policy section of your Information Security Policy. One important aspect to always consider is the budget and don't be surprised if this changes during your process. Below are detailed breakdowns of what you need to include with each section, I hope this helps and feel free to ask any questions.

For this assignment, chapter 4 is a great resource as well as our class discussions.

User enrollment -remember to include your scenario

• What is user enrollment?
• How and why is this used?

Identification -remember to include your scenario

• What is identification?
• How and why identification is used to identify a user?
• Describe advance techniques used to identify a user?

Authentication - remember to include your scenario

• What is authentication?
• How and why authentication credentials are used to identify and control access to files, screens, and systems?
• Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Privileged and special account access - remember to include your scenario

• How and why privileged and special account access are used?
• Include group-based and user-assigned privileges.

Remote access - remember to include your scenario

• What is remote access?
• Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN)

Access Co

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Describe how and why discretionary access control will be used. Include an explanation of how the principle of least privilege applies to assure confidentiality. Explain who the information owner is that has the responsibility for the information and has the discretion to dictate access to that information.

Describe how and why mandatory access control will be used.

Describe how and why role-based access control will be used.

Remote Access

Describe the policies for remote user access and authentication via dial-in user services and Virtual Private Networks (VPN).

Reference no: EM131099705

Questions Cloud

Stock market game outline and grading rubric : We will be playing a stock market game for approximately 4 weeks. Below are the rules of the game, which you should read carefully. Failure to meet all the requirements of the game will negatively impact your grade on the project.
Probability of completing the exam : 1. The time needed to complete a final examination in a particular college course is normally distributed with a mean of 79 minutes and a standard deviation of 8 minutes. Answer the following questions. a. What is the probability of completing the..
Compute the input capacitance of the circuit : compute the input capacitance of the circuit.
Bureau of transportation statistics website : The mean cost of domestic airfares in the United States rose to an all-time high of $385 per ticket (Bureau of Transportation Statistics website, November 2, 2012). Airfares were based on the total ticket value, which consisted of the price charge..
Describe how and why mandatory access control will be used : Describe how and why mandatory access control will be used. Describe how and why role-based access control will be used. How and why privileged and special account access are used?
Four-week moving average : Estimate demand for the next four weeks using a four-week moving average as well as simple exponential smoothing with a = .01. Evaluate the MAD, MAPE, MSE, bias and TS in each case. Which of the two methods do you prefer? Why?
What is the minimum tolerable value of rl : what is the minimum tolerable value of RL?
Determine the maximum allowable value of rc : We wish to design the common-base stage of Fig. 11.93 for a -3-dB bandwidth of 10 GHz.
What could have been done to prevent the incident : How the incident was mitigated and resolved, if it was. What standards, codes, or laws were violated that resulted in the incident and What could have been done to prevent the incident.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Using the prime p 2621and encryption key e 7 encrypt the

1 using the prime p 2621and encryption key e 7 encrypt the message sweet dreams using modular exponentiation.2 what

  Analyze current state of insider threats to computer systems

Analyze the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems. What are the various profiles of insiders who may compromise your systems?

  Mobile computing and social networking

Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile computing has had a big impact on is health care management. Patients are now..

  Description of the kerberos authentication protocol

Give your general description of the Kerberos authentication protocol and explain the term: Authenticator used in the Kerberos authentication protocol.

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

  How the information will be used for system requirements

How the information will be USED for system requirements - what are the key features of the organizational context of the project - why the project will be successful

  Infa 640 cryptology and data protection

Suppose that Eve runs a key server.  Alice downloads a key from the key server which Eve claims is Bob’s public key.  Bob downloads a key from the key server which Eve claims is Alice’s public key.

  Automated digital job application system

List down advantages that come about having an automated digital job application system

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  Research in the area of information security awareness

1-2 page APA style paper summarizing research in the area of Information security awareness

  Describe the different types of computer attacks

Describe the different types of computer attacks

  Create an overview of the hipaa security rule

Create an overview of the HIPAA Security Rule and Privacy Rule - analyze the major types of incidents and breaches that occur based on the cases reported.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd