Computers and Technology
Computers and Technology, 09.04.2021 04:00, zzk8

Access controls can be applied in various forms, levels of restriction, and at different places within a computing system. A combination of access controls can provide a system with layered defense-in-depth protection. Instructions:
For the scenarios that follow, identify the data that would need to be protected. Recommend how you would implement one of the access controls (listed after the scenarios) for the given scenario and justify your recommendation.
Scenarios:
1. Shovels and Shingles is a small construction company consisting of 1 multi-purpose server and 25 networked workstations. All employees have Internet access and use email. A few employees use tablet PCs in the field.
2. Backordered Parts is a mid-size defense contractor that builds communications parts for the military. The company has 15 servers and 250 workstations. All employees must have security clearances, and they communicate mainly using BlackBerry devices and email.
3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones, tablet PCs, laptops, and email. Many employees work from home and travel extensively.
4. Access Controls
5. Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.
6. Logical/technical controls: Control access to a computer system or network, such as a username and password combination
7. Hardware controls: Equipment that checks and validates IDs, such as a smart card for or security token for multifactor authentication.
8. Software controls: Controls embedded in operating system and application software, such as NTFS permissions.
9. Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 14:00, michelle7511
Which database model is best used for data warehouse and data mining
Answers: 3
image
Computers and Technology, 23.06.2019 04:31, legendman27
Jennifer has to set up a network in a factory with an environment that has a lot of electrical interference. which cable would she prefer to use? jennifer would prefer to use because its metal sheath reduces interference.
Answers: 1
image
Computers and Technology, 23.06.2019 09:30, ranmmm
The place where the extended axis of the earth would touch the celestial sphere is called the celestial
Answers: 1
image
Computers and Technology, 24.06.2019 09:50, potatocow
Self contained sequences of actions to be performed are? a. expressions b. algorithms c. functions d. formulas
Answers: 1
Do you know the correct answer?
Access controls can be applied in various forms, levels of restriction, and at different places with...

Questions in other subjects:

Konu
History, 17.03.2020 01:29