Develop a report to management outlining

Assignment Help Management Information Sys
Reference no: EM133955273

Assignment:

The four major areas that you should consider when collecting and writing security requirements documents are:

  1. User Management
  2. Data Management
  3. Access Control
  4. Auditing

Select one of these four areas and develop a report to management outlining and identifying the specific questions that would need to be asked and addressed to determine that adequate access controls are in place to mitigate the inherent risks associated with these significant areas.

Please be sure that your response not only lists the specific questions to be asked but that you also identify which type of access control (see list below) that each question is designed to assess.

Access Controls

  • Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.
  • Logical/technical controls: Control access to a computer system or networks, such as a username and password combination
  • Hardware controls: Equipment that checks and validates IDs, such as a smart-card for or security token for multifactor authentication.
  • Software controls: Controls embedded in operating system and application software, such as NTFS permissions.
  • Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

Reference no: EM133955273

Questions Cloud

Compare vulnerability assessment to penetration testing : Provide a recommendation to management, outlining under what conditions, management should consider selecting Penetration Testing or Vulnerability Analysis.
Create a concept map as an overview of the system : Create a concept map as an overview of the system. A list of terms that must be incorporated into the assignment is provided below, but feel free to add terms
What is authorization : What is authorization? What is the process for approving users for access and what resources can they access?
Create an interesting visual or infographic : Create an interesting visual or infographic so that an outside observer can quickly learn the pros and cons of the topic you chose
Develop a report to management outlining : Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.
Create and present a portfolio of a specific diagnoses : Create and present a portfolio of a specific diagnoses, or "cheat sheet" to share with class mates - Feel free to email them to your peers
How criminal justice administrators facilitate or hinder : Are at least three peer-reviewed sources used appropriately? Do the sources support the claims? Is APA 7 format applied correctly?
Research the details of a ddos attack on a known corporation : Research the details of a DDOS attack on a known corporation (or industry). What type of legal evidence could be used in the investigation of such an attack?
Methods of implementation and management of the cryptography : What differences do you find in methods of implementation and management of the cryptography?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd