subject
Engineering, 26.11.2019 04:31 jamerica0

Access controls can be applied in various forms, levels of restriction, and at different places within a computing system. a combination of access controls can provide a system with layered defense-in-depth protection. instructions: for the scenarios that follow, identify the data that would need to be protected. recommend how you would implement one of the access controls (listed after the scenarios) for the given scenario and justify your recommendation. scenarios: 1. shovels and shingles is a small construction company consisting of 1 multi-purpose server and 25 networked workstations. all employees have internet access and use email. a few employees use tablet pcs in the field. 2. backordered parts is a mid-size defense contractor that builds communications parts for the military. the company has 15 servers and 250 workstations. all employees must have security clearances, and they communicate mainly using blackberry devices and email. 3. netsecit is a multinational it services company consisting of 120,000 computers that have internet access and 45,000 servers. all employees communicate using smartphones, tablet pcs, laptops, and email. many employees work from home and travel extensively. access controls administrative controls: policies approved by management and passed down to staff, such as policies on password length. 1. logical/technical controls: control access to a computer system or network, such as a username and password combination 2. hardware controls: equipment that checks and validates ids, such as a smart card for or security token for multifactor authentication. 3. software controls: controls embedded in operating system and application software, such as ntfs permissions. 4. physical controls: control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

ansver
Answers: 1

Another question on Engineering

question
Engineering, 03.07.2019 19:30
When using the ohmmeter function of a digital multimeter, the leads are placed in what position relative to the component being tested? a. parallel b. control c. series d. line
Answers: 3
question
Engineering, 04.07.2019 18:10
Afour cylinder four-stroke in-line engine has a stroke of 160mm, connecting rod length of 150mm, a reciprocating mass of 3kg and its firing order is 1-3-4-2. the spacing between cylinders is 100mm. i. show that the engine is in balance with regard to the primary inertia forces and primary 3. a and secondary inertia couples. li determine the out of balance secondary inertia force ii. propose ways of balancing this out of balance force and discuss the challenges that will arise
Answers: 3
question
Engineering, 04.07.2019 18:10
Determine whether or not it is possible to compress air adiabatically from k to 140 kpa and 400 k. what is the entropy change during this process?
Answers: 3
question
Engineering, 04.07.2019 18:10
You are making beer. the first step is filling the glass carboy with the liquid wort. the internal diameter of the carboy is 15 in., and you wish to fill it up to a depth of 2 ft. if your wort is drawn from the kettle using a siphon process that flows at 3 gpm, how long will it take to fill?
Answers: 1
You know the right answer?
Access controls can be applied in various forms, levels of restriction, and at different places with...
Questions