Cis 560-Security Access & Control Strategies

In: Computers and Technology

Submitted By jesstsosie
Words 1408
Pages 6
CIS 560-Security Access & Control Strategies

http://homeworklance.com/downloads/cis-560-security-access-control-strategies/
CIS 560-Security Access & Control Strategies CIS 560 Week 3 Assignment 1: Access Restrictions In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment.
Write a four to five (4-5) page paper in which you:
1. Identify the business you have selected.
2. Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access.
3. Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access.
4. Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access.
5. Determine the type of access levels you would provide to a contractor or consultant.
6. Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources. CIS 560 Case Study 2: Cisco’s Remote Access Case Study 2: Cisco’s Remote Access
Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and Teleworkers”, located at http://bit.ly/MkvlbA. According to the study, an IDC forecast from December 2007, expected the global mobile worker population to increase from 758.6 million in 2006 to more than 1.0 billion in 2011. Cisco had a significant number of telecommuting employees and faced three challenges: provide network access features that cannot be supported on a software VPN client,…...

Similar Documents

Cis 210 - Access Control System

...Building an Access Control System As a member of the Information Security team at a small college, you have been made the project manager to install an access control system (ACS) in a dormitory. The ACS will automatically unlock the dormitory doors via an electronic proximity reader and integrate with an existing security camera system. The cameras are designed to face and rotate to record a person as they use their identification card to unlock the door. Create a 3-4 page project plan for this project in which you: Include a one-half page project scope statement. Define five (5) major tasks, each with one to two (1-2) subtasks. Also write a brief description for each task. Create a Gantt chart illustrating the project tasks (use Microsoft Project or a similar project management program). Create a system diagram illustrating the equipment and connections required for this project (use Microsoft Visio or a similar software package). Building an Access Control System CIS210 Building an Access Control System Introduction An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may......

Words: 1248 - Pages: 5

Enhance Security Controls for Access to Sensitive Data

...verifying there role. 3. Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at the LAN-to-WAN Domain level? 1. Smart Cards – A token CAC card that is used in tandem with a password 2. Passwords – User defined passwords that coincide with password standards. 3. Cognitive password – Pre-answered questions that hopefully only the user knows the answer to. 4. When a computer is physically connected to a network port, manual procedures and/or an automated method must exist to perform what type of security functions at the Network Port and Data Switch level for access control? Name and define at least three. Verify authorized access to the asset Verify the user is who they say they are through authentication Verify the configuration of the computer is compliant with local security standards.. 5. What is a Network Access Control (NAC) System? Explain its benefits in securing access control to a network. A NAC is the use of certain policy of the network information structure that temporarily limits access the certain recourses while authenticating the user. 6. Explain the purpose of a Public Key Infrastructure (PKI) and give an example of how you would implement it in a large organization whose major concern is the proper distribution of certificates across many sites. PKI - a framework consisting of programs, procedures and security policies that support cryptography and certificate standards. A PKI or Public......

Words: 536 - Pages: 3

Cis 560 Assignment 2: Single Sign-on Access

...CIS 560 Assignment 2: Single Sign-On Access http://homeworklance.com/downloads/cis-560-assignment-2-single-sign-on-access/ CIS 560 Assignment 2: Single Sign-On Access Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization. Write a four to five (4-5) page paper in which you: 1. Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented. 2. Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access. 3. Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access. 4. Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of: 1. configurability 2. established standards 3. implementation challenges 4. cost 5. Use at least three (3) quality resources in this......

Words: 326 - Pages: 2

Cis 560 Case Study 2: Cisco’s Remote Access

...CIS 560 Case Study 2: Cisco’s Remote Access http://homeworklance.com/downloads/cis-560-case-study-2-ciscos-remote-access/ CIS 560 Case Study 2: Cisco’s Remote Access Case Study 2: Cisco’s Remote Access Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and Teleworkers”, located at http://bit.ly/MkvlbA. According to the study, an IDC forecast from December 2007, expected the global mobile worker population to increase from 758.6 million in 2006 to more than 1.0 billion in 2011. Cisco had a significant number of telecommuting employees and faced three challenges: provide network access features that cannot be supported on a software VPN client, automate and simplify router provisioning and updates, and enable a scalable VPN solution to support up to 30,000 workers. Write a four to five (4-5) page paper in which you: 1.Evaluate the deployment cost savings realized by Cisco, and determine if it was significant. 2.Analyze how the solution deployed by Cisco improved: a.employee productivity b.satisfaction c.retention 3.Discuss how Cisco was able to achieve VPN scalability to support thousands of users. 4.When thousands of employees telecommute and work in virtual offices, there are benefits to the environment. Discuss the environmental impact of the Cisco telecommuting and virtual offices solution. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality......

Words: 325 - Pages: 2

Cis 560 Assignment 2: Single Sign-on Access

...CIS 560 Assignment 2: Single Sign-On Access http://homeworklance.com/downloads/cis-560-assignment-2-single-sign-on-access/ CIS 560 Assignment 2: Single Sign-On Access Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization. Write a four to five (4-5) page paper in which you: 1. Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented. 2. Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access. 3. Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access. 4. Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of: 1. configurability 2. established standards 3. implementation challenges 4. cost 5. Use at least three (3) quality resources in this......

Words: 326 - Pages: 2

Cis 560 Case Study 2: Cisco’s Remote Access

...CIS 560 Case Study 2: Cisco’s Remote Access http://homeworklance.com/downloads/cis-560-case-study-2-ciscos-remote-access/ CIS 560 Case Study 2: Cisco’s Remote Access Case Study 2: Cisco’s Remote Access Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and Teleworkers”, located at http://bit.ly/MkvlbA. According to the study, an IDC forecast from December 2007, expected the global mobile worker population to increase from 758.6 million in 2006 to more than 1.0 billion in 2011. Cisco had a significant number of telecommuting employees and faced three challenges: provide network access features that cannot be supported on a software VPN client, automate and simplify router provisioning and updates, and enable a scalable VPN solution to support up to 30,000 workers. Write a four to five (4-5) page paper in which you: 1.Evaluate the deployment cost savings realized by Cisco, and determine if it was significant. 2.Analyze how the solution deployed by Cisco improved: a.employee productivity b.satisfaction c.retention 3.Discuss how Cisco was able to achieve VPN scalability to support thousands of users. 4.When thousands of employees telecommute and work in virtual offices, there are benefits to the environment. Discuss the environmental impact of the Cisco telecommuting and virtual offices solution. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality......

Words: 325 - Pages: 2

Cis 560 Assignment 2- Single Sign-on Access

...CIS 560 Assignment 2- Single Sign-On Access Click Link Below To Buy: http://hwcampus.com/shop/cis-560-assignment-2-single-sign-on-access/ Or Visit www.hwcampus.com Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization. Write a four to five (4-5) page paper in which you: Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented. Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access. Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access. Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of: configurability established standards implementation challenges cost Use at least three (3) quality resources in this assignment.Note:Wikipedia......

Words: 319 - Pages: 2

Cis 560 Assignment 2- Single Sign-on Access

...CIS 560 Assignment 2- Single Sign-On Access Click Link Below To Buy: http://hwcampus.com/shop/cis-560-assignment-2-single-sign-on-access/ Or Visit www.hwcampus.com Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization. Write a four to five (4-5) page paper in which you: Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented. Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access. Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access. Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of: configurability established standards implementation challenges cost Use at least three (3) quality resources in this assignment.Note:Wikipedia......

Words: 319 - Pages: 2

Cis 560 Assignments , Case Study and Term Paper (Security Access & Control Strategies)

...CIS 560 Assignments , Case Study and Term Paper (Security Access & Control Strategies) Click Link Below To Buy: http://hwcampus.com/shop/cis-560-assignments-case-study-and-term-paper/ Or Visit www.hwcampus.com CIS 560 Week 3 Assignment 1: Access Restrictions In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment. Write a four to five (4-5) page paper in which you: Identify the business you have selected. Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access. Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access. Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access. Determine the type of access levels you would provide to a contractor or consultant. Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources. CIS 560 Case Study 2: Cisco’s Remote Access Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and......

Words: 1389 - Pages: 6

Cis 560 Assignment 2- Single Sign-on Access

...CIS 560 Assignment 2- Single Sign-On Access Click Link Below To Buy: http://hwcampus.com/shop/cis-560-assignment-2-single-sign-on-access/ Or Visit www.hwcampus.com Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization. Write a four to five (4-5) page paper in which you: Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented. Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access. Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access. Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of: configurability established standards implementation challenges cost Use at least three (3) quality resources in this assignment.Note:Wikipedia......

Words: 319 - Pages: 2

Cis 560 Assignments , Case Study and Term Paper (Security Access & Control Strategies)

...CIS 560 Assignments , Case Study and Term Paper (Security Access & Control Strategies) Click Link Below To Buy: http://hwcampus.com/shop/cis-560-assignments-case-study-and-term-paper/ Or Visit www.hwcampus.com CIS 560 Week 3 Assignment 1: Access Restrictions In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment. Write a four to five (4-5) page paper in which you: Identify the business you have selected. Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access. Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access. Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access. Determine the type of access levels you would provide to a contractor or consultant. Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources. CIS 560 Case Study 2: Cisco’s Remote Access Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and......

Words: 1389 - Pages: 6

Cis 560 Midterm

...CIS 560 Midterm Click Link Below To Buy: http://hwcampus.com/shop/cis-560-midterm/ In a data classification scheme, least privilege and need to know ensure that access to data and information is available to __________. The method of organizing sensitive information into various access levels is known as __________. In access control, which of the following best describes access? Which of the following is a strategy that tricks a user into giving up their password or granting access to an attacker? Which of the following is measured in terms of probability and impact? From an organizational standpoint, which of the following is ensured through compliance? Which of the following scans every packet that passes through and either rejects it or allows it to pass? In a corporation, which of the following is considered a special case of proprietary information? Which of the following ensures that only one person does not handle all crucial decisions and activities, especially those involving a high level of trust? Which of the following is not a typical social engineering strategy? Proof of identity is the additional step involved in _________. Which of the following statements does not hold true for RBAC? Which of the following defines how employees may use an IT infrastructure supplied by an organization? Which of the following factors is not used for network and infrastructure authentication? The best way to......

Words: 410 - Pages: 2

Cis 560 Assignment 2- Single Sign-on Access

...CIS 560 Assignment 2- Single Sign-On Access Click Link Below To Buy: http://hwcampus.com/shop/cis-560-assignment-2-single-sign-on-access/ Or Visit www.hwcampus.com Some business and organizational network infrastructures consist of multiple systems from the same or different vendors to provide, conduct, process, and execute various business functions. Some employees must access one or more of these systems using valid access credentials (username and password). Logging in and out of each system whenever access is desired can become a problem for most users. Businesses and organizations have resorted to using Single Sign-On (SSO) for user authentication and authorization. Write a four to five (4-5) page paper in which you: Analyze at least five (5) problems experienced by employees in an enterprise where Single Sign-On (SSO) has not been implemented. Some businesses and organizations use Active Directory (AD) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using AD for SSO access. Some businesses and organizations use Lightweight Directory Access Protocol (LADP) to provide SSO access to the enterprise. Analyze the advantages and disadvantages of using LADP for SSO access. Compare and contrast a Kerberos-based SSO configuration to a smart card based configuration in terms of: configurability established standards implementation challenges cost Use at least three (3) quality resources in this assignment.Note:Wikipedia......

Words: 319 - Pages: 2

Cis 560 Assignments , Case Study and Term Paper (Security Access & Control Strategies)

...CIS 560 Assignments , Case Study and Term Paper (Security Access & Control Strategies) Click Link Below To Buy: http://hwcampus.com/shop/cis-560-assignments-case-study-and-term-paper/ Or Visit www.hwcampus.com CIS 560 Week 3 Assignment 1: Access Restrictions In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment. Write a four to five (4-5) page paper in which you: Identify the business you have selected. Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access. Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access. Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access. Determine the type of access levels you would provide to a contractor or consultant. Use at least three (3) quality resources in this assignment.Note:Wikipedia and similar Websites do not qualify as quality resources. CIS 560 Case Study 2: Cisco’s Remote Access Go to Cisco’s Website and read, “How Cisco IT Provides Remote Access for Small Offices and......

Words: 1389 - Pages: 6

Cis 560 Midterm

...CIS 560 Midterm Click Link Below To Buy: http://hwcampus.com/shop/cis-560-midterm/ In a data classification scheme, least privilege and need to know ensure that access to data and information is available to __________. The method of organizing sensitive information into various access levels is known as __________. In access control, which of the following best describes access? Which of the following is a strategy that tricks a user into giving up their password or granting access to an attacker? Which of the following is measured in terms of probability and impact? From an organizational standpoint, which of the following is ensured through compliance? Which of the following scans every packet that passes through and either rejects it or allows it to pass? In a corporation, which of the following is considered a special case of proprietary information? Which of the following ensures that only one person does not handle all crucial decisions and activities, especially those involving a high level of trust? Which of the following is not a typical social engineering strategy? Proof of identity is the additional step involved in _________. Which of the following statements does not hold true for RBAC? Which of the following defines how employees may use an IT infrastructure supplied by an organization? Which of the following factors is not used for network and infrastructure authentication? The best way to......

Words: 410 - Pages: 2