d2jsp
Gaming and Trading Community
Gaming and Trading Community
d2jsp Forums > General Chat > Homework Help Hotline > Information Security Homework (access Controls) > If Anyone Is Familiar And/or Just Smart
Add Reply New Topic New Poll
Page 1 of 1
darkdragoon98
#1 Sep 30 2011 07:58pm
Group: Members
Posts: 2,168
Joined: Apr 29 2010
Gold: 0.00
Paying FG for help/full answers :D no bs though i know what this stuffs about, it's just an online class and dont have the book (it's like brand new and costs hundreds of dollars and is useless)

theres very little instruction and the teacher puts random shit (normally it can be googled for proper answers and or the source where she got it, though i cant seem to do it this time


2 separate assignments, i'm thinking like 300 each for the full thing, it's not that hard either



Access controls can be applied in various forms, levels of restriction, and at different places within a computing system. A combination of access controls can provide a system with layered “defense-in-depth” protection.

Instructions:
For the scenarios that follow, identify the data that would need to be protected. Recommend how you would implement one or more of the following controls for the given scenarios and justify your recommendation:
 Administrative controls
 Logical and technical controls
 Hardware controls
 Software controls
 Physical controls

Scenarios:
1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access.
2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones.
3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.
4. Backordered Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail.
5. Confidential Services Inc. is a military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using BlackBerry devices and e-mail.


___________________________________________________



Instructions:
Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below. Which types of logical access controls should be used in each scenario? Justify your recommendations.

Access control models:
 Mandatory access controls
 Discretionary access controls
 Role-based access controls
 Rule-based access controls
 Content-dependent access controls
 Nondiscretionary access controls

Scenarios:
1. Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access.
2. Top Ads is a small advertising company consisting of 12 computers that have Internet access. All employees communicate using smartphones.
3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.
4. Backordered Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail.
5. Confidential Services Inc. is a military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using BlackBerry devices and e-mail.
darkdragoon98
#2 Sep 30 2011 08:33pm
Group: Members
Posts: 2,168
Joined: Apr 29 2010
Gold: 0.00
no longer need this, figured it out
Go Back To Homework Help Hotline Topic List
Page 1 of 1