skip to Main Content
The smarter way
to do assignments.

Please note that this is just a preview of a school assignment posted on our website by one of our clients. If you need assistance with this question too, please click on the Order button at the bottom of the page to get started.

Project 1 Apply Access Controls Access controls can be applied in various forms, levels of restriction, and at different places within a computing system. A combination of access controls can provide a system with layered defense-in-depth protection. Instructions: For the scenarios that follow, identify the data that would need to be protected. Recommend how you would implement one of the access controls (listed after the scenarios) for the given scenario and justify your recommendation. Scenarios: Shovels and Shingles is a small construction company consisting of 1 multi-purpose server and 25 networked workstations. All employees have Internet access and use email. A few employees use tablet PCs in the field. Backordered Parts is a mid-size defense contractor that builds communications parts for the military. The company has 15 servers and 250 workstations. All employees must have security clearances, and they communicate mainly using BlackBerry devices and email. NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones, tablet PCs, laptops, and email. Many employees work from home and travel extensively. Access Controls Administrative controls: Policies approved by management and passed down to staff, such as policies on password length. Logical/technical controls: Control access to a computer system or network, such as a username and password combination Hardware controls: Equipment that checks and validates IDs, such as a smart card for or security token for multi factor authentication. Software controls: Controls embedded in operating system and application software, such as NTFS permissions. Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door. Submission Requirements Format: Microsoft Word Font: Arial 12-point, double-spaced Length: 1–2 pages Self-Assessment Checklist You identify the data that would need to be protected. (30 points) In your answer, you recommended how you would implement one of the access controls. (30 points) You recommended how you would implement one of the access controls for each scenario. (30 points) You followed the syllabus and submission guidelines. (10 points)


Clicking on this button will take you to our custom assignment page. Here you can fill out all the additional details for this particular paper (grading rubric, academic style, number of sources etc), after which your paper will get assigned to a course-specific writer. If you have any issues/concerns, please don’t hesitate to contact our live support team or email us right away.

How It Works        |        About Us       |       Contact Us

© 2018 | Intelli Essays Homework Service®

Back To Top