Premium Essay

Is404 Week 1 Assignment 1

In: Computers and Technology

Submitted By cmlippert
Words 369
Pages 2
-------------------------------------------------
IS404: Week 1 Assignment 1: Identification, Authentication, and Authorization Techniques

At the Acme Distribution Center, your colleagues are the following employees: * Robert, the lead warehouse receiver * Jennifer, sales and accounts payable * Bradley, the warehouse general manager * LuEllen, the shipper * Buster, the shipper * Lloyd, the purchasing agent * Spare, for temporary help

Using the following legend, provide the users with the appropriate rights and permissions:
A = Assigned to the user F = Needed for primary function
T = Temporary N = Never
BP = By Position Assigned RO = Read Only

Segregation of Duties Matrix | | (System User–Rights and Permissions) | Department | Jennifer | Buster | Bradley | Lloyd | LuEllen | Robert | Spare | Sam | Receiving | RO | RO | F | RO | RO | F | T | A | Shipping | A | F,BP | F | RO | F,BP | RO | T | A, BP | Sales | F | RO | RO | F | RO | RO | RO | A, BP | Accounts Payable | BP | N | N | RO | N | N | N | A, BP |

After assigning the correct roles and access privileges to the users given in the scenario, answer the following questions: * What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
Jennifer’s access account was setup as assigned to the user for all departments which was incompatible because this was not the correct access she needed for her job responsibilities. Jennifer will require access to the Sales Department as needed for primary function because she works in the Sales Department during the day. She also will require access to the Accounts Payable Department as by position assigned because she works part-time as the evening accounts payable clerk. She will need to be an assigned user in the Shipping Department and have

Similar Documents

Premium Essay

It255

...security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System CNS Program Prerequisites: ment 300 Level IT320 WAN Technology &...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

... integrity and confidentiality aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction...

Words: 4296 - Pages: 18