Description The case study company has provided you with the flexibility to identify many different information systems that are used by the employees.

Description

The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control, whereas others should be available to everyone. What access control methods need to be employed for the various systems? How can the company protect the new consultant network while providing the protection of data that the stakeholders and customers require?

In addition, you have been asked to describe 2 access control mechanisms and consider whether they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and whether they can be used in the company.

Complete the following section for Week 3:

  • Week 3: Access Controls and Security Mechanisms
    • For each of the applications and systems that were described in Individual Project 2, describe the access control mechanisms that are needed for each.
    • Describe how the new expanded network can be protected through access control.
    • Describe SSO and VPN technology, and discuss whether they can be used in the company.

Worked Example

Please refer to the following worked example of this assignment based on the problem-based learning (PBL) scenario. The worked example is not intended to be a complete example of the assignment, but it will illustrate the basic concepts that are required for completion of the assignment, and it can be used as a general guideline for your own project. Your assignment submission should be more detailed and specific, and it should reflect your own approach to the assignment rather than just following the same outline.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key

As a final deliverable to the management team, create a Power Point presentation (Should 7-8 slides) that summarizes the solutions outlined in the Key Assignment template. In addition, describe why the proposed solution is the correct method or mechanism to be implemented. Key Assignment template. Propose an appropriate network infrastructure that

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should

When designing your ePortfolio, you will want to ensure the navigation is intuitive. The artifacts presented in each section of your ePortfolio should demonstrate your understanding of professional and ethical responsibility in relation to cyber security operations and leadership. For this assignment, review your coursework  and identify artifacts that can

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments.  Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled Data Breach an All-Too-Often Occurrence. After reviewing the story, conduct research online into

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and

Primary Task Response: Write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. Be substantive and clear, and use examples to reinforce your ideas. Before you start this assignment, please read the story entitled The Importance of Knowing Your Own Security Posture.  After reviewing the story, conduct

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your

Assignment Type: Essay (any type) Service: Writing Pages/Words: 5 pages / 1375 words (Double spacing) Education Level: College Language: English (US)  Your Deadline: Aug 26, 08:00 PM  Assignment Topic: How to Avoid Being a Victim of Cybercrime Subject: Internet Technology (IT) Sources: 10 sources required Citation Style: APA 7th edition