Describe identification authentication and authorization


Problem

Assume you are a manager in a large international organization. You have been asked to assess the company's information systems and security controls.

1) Describe identification, authentication, and authorization.
2) Explore whether or not you would use Windows ACLs and explain your reasoning.
3) Evaluate best practices for managing Microsoft Windows and application vulnerabilities.

Keep in mind, we are more interested in your ability to describe the steps you would take to review security goals than providing an answer to this scenario. Remember the strategy of Think, Plan, Design, Implement, and Evaluate.

The response must include a reference list. One-inch margins, double-space, Using Times New Roman 12 pnt font and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Other Subject: Describe identification authentication and authorization
Reference No:- TGS03165983

Now Priced at $20 (50% Discount)

Recommended (91%)

Rated (4.3/5)