How having proper permission and correct access control list


Assignment

Provide an overview of Defensive Tactics and Technologies and Trade-Offs when addressing threats. Data tampering has become a significant problem in the US and many other countries abroad. You can read an article here that discusses this in more detail:

Article: "The Risks of Data Tampering and How to Prevent It".

After reading chapter 8 and 9, you're ready to participate in the next discussion.

In your textbook, it discusses issues around integrity and specific Tactics for Integrity (p. 149). The author identifies three main ways to address tampering threats: Permissions/ACLs, Use of Cryptographic mechanisms, and the use of logging technology and audit activities as a deterrent.

Answer the following questions in paragraph form only:

How does having proper permissions and correct access control lists in place help with reducing tampering threats for integrity?

How does the use of cryptographic mechanisms help with reducing tampering threats for integrity?

How does the use of logging technology and audit activities provide a deterrent when addressing issues related to tampering threats for integrity?

I know that much of this information is in your textbook, but I am looking for information from OTHER RESOURCES as well to fully answer the questions above.

You must do the following:

1) Create a new thread. As indicated above, answer the questions above. You must use a minimum of three unique references for your initial posts that are preferably from scholarly sources other than your textbook.

2) Select AT LEAST 2 other students' threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread of your classmates. Feel free to agree or disagree (provides reason why it may still be effective), but keep it professional and provide support for your stance as opposed to just verbal statements.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How having proper permission and correct access control list
Reference No:- TGS03003401

Now Priced at $30 (50% Discount)

Recommended (99%)

Rated (4.3/5)