+1835 731 5494 Email: instantessays65@gmail.com

IT/541 IT541 IT 541 Unit 2 Discussion


IT 541 Unit 2 Discussion Determining access controls “Authorization functions” is a process by which access to a particular IT asset can be granted or denied, while access control is used to enforce the rules for authorization. There are several access control models, including “role-based” AC, “discretionary” AC, “mandatory” AC, and “attribute-based” AC. Imagine that, as the security administrator for a medium-sized retail-based organization with around 2000 users, you are tasked with determining the appropriate level of access for a new user in the Human Resources department. What approach would you take to determine access for this person? What methods would you use to verify that the choice of access controls is appropriate for this user? Building an IDS framework Imagine that, as the security manager at XYZ Corporation, you are responsible for managing the intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network-based IDS, host-based IDS, or a combination? Why? How would you structure your staff and organization to get the most out of your investment? Are there any strengths of one over the other that you may take into consideration? Which one is more expensive? Post your thoughts and respond to at least two other students’ postings. Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help


There are no reviews yet.

Be the first to review “IT/541 IT541 IT 541 Unit 2 Discussion”

Your email address will not be published. Required fields are marked *