Why isi needs an access control plan and the goals of plan


Homework: Access Control Strategies

Introduction

In this homework, you will develop strategies to protect the data and file systems of a fictitious software development company. The specific course learning outcome associated with this homework is:

o Determine an access control strategy based on existing documents.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Scenario

Independent Software Incorporated (ISI) is a small software development company with eight employees that work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI's coding development projects often encompass classified information and personally identifiable information (PII).

Task

Write 2 to 4 pages paper in which you:

o Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.

o Develop at least three layered access security strategies that can be used to protect ISI's data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.

o Explain a best practice process and procedures for implementing ISI's access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.

o Describe the verification process that can be used to ensure that ISI's access control plan is effective, citing specific, credible sources that support your assertions and conclusions.

o Explain how ISI's verification process will be maintained and updated in response to future changes in access requirements.

o Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.

Format your homework according to the following formatting requirements:

o The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

o The response also includes a cover page containing the title of the homework, the student's name, the course title, and the date. The cover page is not included in the required page length.

o Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Software Engineering: Why isi needs an access control plan and the goals of plan
Reference No:- TGS03206624

Now Priced at $50 (50% Discount)

Recommended (92%)

Rated (4.4/5)