The case study company has provided you with the


The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control while others should be available to everyone. What access-control methods need to be employed for the various systems? How can the company protect the new consultant network while at the same time providing the protection of data that the stakeholders and customers require?

In addition, you have been asked to describe 2 access control mechanisms and consider if they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and if they can be used in the company.

  • For each of the applications and systems that were described in Week 2, describe the access control mechanisms that are needed for each.
  • Describe how the new expanded network can be protected through access control.
  • Describe SSO and VPN technology, and discuss whether they can be used in the company.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: The case study company has provided you with the
Reference No:- TGS01224234

Now Priced at $50 (50% Discount)

Recommended (92%)

Rated (4.4/5)

A

Anonymous user

2/18/2016 5:41:22 AM

The following case study give a description of a company read the scenario properly and propose answers: The case study company has provided you through the flexibility to recognize many different information systems that are employed via the employees. Several systems require strict access control while others should be available to everyone. What access-control techniques require to be employed for the diverse systems? How can the company protect the new consultant network while at the similar time providing the protection of data that the stakeholders and customers require? As well, you have been asked to explain 2 access control mechanisms and consider if they can be employed in the organization. Explain single sign-on (SSO) and virtual private network (VPN) technology and if they can be employed in the company.