Premium Essay

It 244

In:

Submitted By michalp1986
Words 1302
Pages 6
Associate Level Material
Appendix F

Access Control Policy

Student Name: Michal Przywalny

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: ROMEL LLARENA
Date: April 13, 2014 Access Control Policy

Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems

1 Authentication

Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.

Before being able to access the system, authentication credentials are used to allow the system to verify an individual’s identification credential. During this process the credibility of the user is evaluated. When you authenticate yourself to the system, the system gets the information you have provided to prove that you are who you claim to be. This can be achieved with a simple password. There are three different types of authentication processes. The first is called a single factor. This is your typical password or PIN. Merkow & Breithaupt, (2006) states “Passwords are an example of single-factor authentication, which is simply something that someone knows that is used to gain access to a system with no further requirements for proving identity” (pg. 211). Passwords and PINs are the most basic forms of authentication whereas fingerprints and retinal scan are more complex forms of authentication. A default password or PIN along with a username can be given by the admin for an individual to gain access onto the system. The individual should change that password after logging in for the first time. Even with this authentication passwords have known to be problematic in the past. Passwords can be

Similar Documents

Premium Essay

It/244 Final

...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...

Words: 1790 - Pages: 8

Premium Essay

Mcb 244

...Epiderm (stratified squamous) > underlying dermis LARGEST organst system in body, 16% by weight with lots of SA Stratefied squamous cells Most superficial layer Keratinized Cornefied Complex matrix with very tough protein and helps protect dead cell layer Makes sense, these cells must be exposed Several cell layers make up the epidermis A reticular layer with collagen and elastic fibers that… Leather is made up of: the dermis Provides the strength of the cutaneous membrane Grainy portion of leather is the papillary layer Hypodermis Below the dermis that provides blood Not really part of the cutaneous membrane Preferred area for injections Has a big blood supply Not that many capillary beds—they are feeding the epidermis Functions of the INTEGUMENTARY SYSTEM Protects Excretes: salts, water, and organic waste Maintains body temperature Synthesizes vitamin D3—essential for calcium and phosphorous uptake in intestines. Not enough = rickets Stores fats in dermal layer Detects sensory modalities each hair has a nerve flexus. Can detect movement of just one hair. Epidermis Epidermal ridges Interlocks with dermal papillae Can see this intestines with microvilli? This increases overall SA for the basal lamina Good contact b/w epidermis and dermis Thick skin: soles, palms Difference? How thick corneum is CELLS OF THE EPIDERMIS Keartinoctyes: Kertin! Thin Skin: hairy Thick skin: no hair Thickness of paper towel Stratum basale Deepest: stratum basale ...

Words: 1748 - Pages: 7

Premium Essay

It 244 Final

...Associate Level Material Appendix B Information Security Policy Student Name: Ronald Stride University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Scott Smith Date: January 27, 2013 Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Sunica Music and Movies will be implementing a full security plan to ensure proper handling and access of data in our new system. Vulnerable customer information being properly protected is a top priority for us. An added benefit will be the security and accuracy afforded to employees through this protection. Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with...

Words: 2332 - Pages: 10

Free Essay

Engr 244

...Seventh Edition CHAPTER 4 MECHANICS OF MATERIALS Ferdinand P. Beer E. Russell Johnston, Jr. John T. DeWolf David F. Mazurek Lecture Notes: Brock E. Barry U.S. Military Academy Pure Bending Copyright © 2015 McGraw-Hill Education. Permission required for reproduction or display. MECHANICS OF MATERIALS Pure Bending Seventh Edition Beer • Johnston • DeWolf • Mazurek Pure Bending: Prismatic members subjected to equal and opposite couples acting in the same longitudinal plane Fig. 4.2 (a) Free-body diagram of the barbell pictured in the chapter opening photo and (b) Free-body diagram of the center bar portion showing pure bending. Copyright © 2015 McGraw-Hill Education. Permission required for reproduction or display. 4-2 MECHANICS OF MATERIALS Other Loading Types Seventh Edition Beer • Johnston • DeWolf • Mazurek Fig. 4.3 (a) Free-body diagram of a clamp, (b) freebody diagram of the upper portion of the clamp. • Eccentric Loading: Axial loading which does not pass through section centroid produces internal forces equivalent to an axial force and a couple • Transverse Loading: Concentrated or distributed transverse load produces internal forces equivalent to a shear force and a couple • Principle of Superposition: The normal stress due to pure bending may be combined with the normal stress due to axial loading and shear stress due to shear loading to find the complete state of stress. 4-3 Fig. 4.4 (a) Cantilevered beam with...

Words: 2230 - Pages: 9

Premium Essay

It/244 Week 1

...Associate Level Material Appendix C Introduction Student Name: Philip J. McCarthy UNIVERSITY OF PHOENIX IT/244 INTRO TO IT SECURITY Instructor’s Name: JAMES SERSHEN Date: 04/18/2012 1. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1.1. Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Company I have chosen is, The Bloom Design Group. The Bloom Design Groups mission is to provide online interior design services to its customers. The company offers their customers interior design services. What sets this company apart from others is that they have a website that allows customers a chance to design and decorate their rooms to their liking in a virtual environment before spending their money. The option provided for their customers is a virtual decorating tool. With this tool customers can play around with various color schemes for each room’s floor and ceilings, as well as customizing furniture as well. Then employees are able to access the corporate network through a VPN collection to access their client files, in order to place electronic orders for the design materials and furniture. 1.2. Security policy overview Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. Program-Framework security...

Words: 924 - Pages: 4

Premium Essay

It/244 Assignment: Vlan

...Assignment: VLAN IT/242 January 19, 2012 Instructor: Dr. Jimmie Flores Assignment: VLAN VLAN short for Virtual Local Area Network is a new LAN technology that allows addition of a cost effective network that does not compromise security or performance of the network. VLAN is defined as “a switched network that is logically segmented on an organizational basis; either by functions, project teams, or applications rather than on a physical or geographical basis” (Regan, (2004)). Using VLAN’s are excellent for organizations with multiple departments since VLAN can be created for the specific needs of each department even ignoring the need of a central physical location. “A VLAN can be thought of as a broadcast domain that exists within a defined set of switches” (Regan, (2004)). Switches are nowadays more economical in price so organizations are replacing older hubed networks with switched networks designed for using VLAN’s. VLAN’s are able to divide and isolate a network into different broadcast domains. According to Regan, (2004) VLAN’s are basically a bridge domain that has all broadcast traffic isolated and contained within the VLAN. VLAN’s also provides complete and total isolation from other VLAN’s. Security is also improved by using VLAN’s since they are able to isolate groups. Users are not able to physically connect to a VLAN so access can’t be gained from just plugging into the switch (Regan, (2004)). Servers also can be assigned to multiple...

Words: 740 - Pages: 3

Premium Essay

It 244 Week 1

...Associate Level Material Appendix A Final Project Overview and Timeline Final Project Overview In completing each assignment, you build the sections of an Information Security Policy. Final Project Timeline You should budget your time wisely and work on your project throughout the course. As outlined below, the assignments in the course are designed to assist you in creating your final project Information Security Policy. If you complete your course activities and use the feedback provided by the instructor, you will be on the right track to successfully complete your final project of creating an Information Security Policy. □ Week One: Introduction Review the two company profiles provided in your syllabus and select the one you will use for your final project company. You design the Information Security Policy for this company throughout the course. Once you have decided which company you are using, it may not be changed; therefore, considerable thought should be put into this decision. Next, decide which type of information security policy—program-level, program-framework, issue-specific, or system-specific—is appropriate for your final project company. Assignment: Final Project Information Security Policy: Introduction Complete and submit Appendix C. Note. Section 1 Introduction of Appendix C corresponds to Section 2 of Appendix B in the final compilation due in Week Nine. In completing Appendix C, provide an overview...

Words: 899 - Pages: 4

Premium Essay

It/244 Appendix C

...Associate Level Material Appendix C Introduction Student Name: Pete Lorincz University of Phoenix IT/244 Intro to IT Security Instructor’s Name: Tom Joseph Date: June 10, 2012 Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 1 Company overview As relates to your selected scenario, give a brief 100- to 200-word overview of the company. The Bloom Design Group which provides services throughout the globe and has two locations in the United States, located in Los Angeles, and New York. The corporate office is located in New York. The company offers customers a virtual decorating tool for their clients to create their specific designs. The website allows the interior designers to access the client files and company style guides along with the ability to electronically process orders for design materials and furniture. A secure login and password is required from the designers to access the website and its many features. The employees work remotely to access the corporate network use a VPN. 2 Security policy overview Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why. The implementation of the system-specific policy would be the proper choice for Bloom Design Group. The system-specific policy is...

Words: 664 - Pages: 3

Premium Essay

Cmgt 244 Entire Course

...com/shop/cmgt-244-entire-course/ CMGT 244 ENTIRE COURSE CMGT 244 ENTIRE COURSE, CMGT 244 ENTIRE COURSE http://www.homeworkproviders.com/shop/cmgt-244-entire-course/ CMGT 244 ENTIRE COURSE Product Description CMGT 244 Week #1 DQ 1 CMGT 244 Week #1 DQ 2 CMGT 244 Week #1 DQ 3 CMGT 244 Week #1 DQ 4 CMGT 244 Week #1 DQ 5 CMGT 244 Week #1 DQ 6 WEEK 2 CMGT 244 Week #2 DQ 1 CMGT 244 Week #2 DQ 2 CMGT 244 Week #2 DQ 3 CMGT 244 Week #2 DQ 4 CMGT 244 Week #2 DQ 5 WEEK 3 CMGT 244 Week #3 DQ 1 CMGT 244 Week #3 DQ 2 CMGT 244 Week #3 DQ 3 CMGT 244 Week #3 DQ 4 CMGT 244 Week #3 DQ 5 WEEK 4 CMGT 244 Week #4 DQ 1 CMGT 244 Week #4 DQ 2 CMGT 244 Week #4 DQ 3 CMGT 244 Week #4 DQ 4 WEEK 5 CMGT 244 Week #5 DQ 1 CMGT 244 Week #5 DQ 2 CMGT 244 Week #5 DQ 3 CMGT 244 Week #5 DQ 4 CMGT 244 Week 1 DQs CMGT 244 Week 2 DQs CMGT 244 Week 2 Assignment CMGT 244 Week 3 DQs CMGT 244 Week 3 Assignment Establishing a Secure Computer Room CMGT 244 Week 4 DQs CMGT 244 Week 4 Assignment Intro to OSI Model CMGT 244 Week 5 DQs CMGT 244 Week 5 Final Project Information Security Policy for the Bloom Design Group Paper CMGT 244 Week 5 Information Security Policy for the Bloom Design Group Presentation PPT A++ graded !! CMGT 244 ENTIRE COURSE http://www.homeworkproviders.com/shop/cmgt-244-entire-course/ CMGT 244 ENTIRE COURSE Product Description CMGT 244 Week #1 DQ 1 CMGT 244 Week #1 DQ 2 CMGT 244 Week #1 DQ 3 CMGT 244 Week #1 DQ 4 CMGT 244 Week #1...

Words: 522 - Pages: 3

Free Essay

Microbiology Semester Test 244

...VOORLETTERS EN VAN/INITIALS AND SURNAME:………………………………………….. STUDENTE NOMMER/STUDENT NUMBER:………………………………………….…………... GEEN SAKREKENAARS WORD TOEGELAAT NIE NO CALCULATORS ARE PERMITTED |UNIVERSITEIT VAN STELLENBOSCH |UNIVERSITY OF STELLENBOSCH | |DEPARTEMENT MIKROBIOLOGIE |DEPARTMENT OF MICROBIOLOGY | |SEMESTERTOETS 2012 |SEMESTER TEST 2012 | |MIKROBIOLOGIE 244 |MICROBIOLOGY 244 | | | |Punte/Marks: 120 |Tyd/Time: 2 uur/hours | Beantwoord alle vrae. Beantwoord Afdeling A op die vraestel en beantwoord Afdeling B in die eksamenboek. Answer all the questions. Answer Section A on the questionnaire and answer Section B in the exam book. AFDELING A/SECTION A Omkring die letter wat ooreenstem met die korrekte antwoord by Vrae 1 tot 30. Vul die korrekte antwoord in vir Vrae 31 en 32. / Circle the letter corresponding to the correct answer...

Words: 2148 - Pages: 9

Premium Essay

Engm 244 Journal

...Tianyi Chen Journal Entry #4 Feb 3, 2015 From the reading, I have learned that people should not make a decision unless there is disagreement; they should not assume that the decision they make is the only right one and all the others are wrong. We need to listen to different opinions when making decisions, and disagreement happens to be a kind of opinions that we usually do not want to hear but would normally do us good. Because of disagreement, we are able to see what is lacking in our plans or decisions and how we can fix it; and it provides valuable alternatives if one decision does not work out. For example, in hiring process, the boss always has some candidates in mind that he wants to hire. However, he may also ask executives for their opinions on the candidates and let them write down what is good or bad about each individual. Disagreement on the people to hire could possibly occur, which might completely contradict what the boss has in mind initially, but in this way, through comparison and contrast, the boss may discover the traits of the candidates that he did not realize and can significantly narrow the list of potential employers. Therefore, it is essential to accept the existence of disagreement and realize its significance in effective decision-making. Second, one should not start with what is acceptable because one has to compromise eventually. Because effective decision makers would love to hear about different perspectives and disagreement matters to them, their...

Words: 1349 - Pages: 6

Premium Essay

Cmgt 244 Entire Course

...CMGT 244 ENTIRE COURSE A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cmgt-244-entire-course Visit Our website: http://hwsoloutions.com/ Product Description CMGT 244 ENTIRE COURSE, CMGT 244 ENTIRE COURSE http://www.homeworkproviders.com/shop/cmgt-244-entire-course/ CMGT 244 ENTIRE COURSE Product Description CMGT 244 Week #1 DQ 1 CMGT 244 Week #1 DQ 2 CMGT 244 Week #1 DQ 3 CMGT 244 Week #1 DQ 4 CMGT 244 Week #1 DQ 5 CMGT 244 Week #1 DQ 6 WEEK 2 CMGT 244 Week #2 DQ 1 CMGT 244 Week #2 DQ 2 CMGT 244 Week #2 DQ 3 CMGT 244 Week #2 DQ 4 CMGT 244 Week #2 DQ 5 WEEK 3 CMGT 244 Week #3 DQ 1 CMGT 244 Week #3 DQ 2 CMGT 244 Week #3 DQ 3 CMGT 244 Week #3 DQ 4 CMGT 244 Week #3 DQ 5 WEEK 4 CMGT 244 Week #4 DQ 1 CMGT 244 Week #4 DQ 2 CMGT 244 Week #4 DQ 3 CMGT 244 Week #4 DQ 4 WEEK 5 CMGT 244 Week #5 DQ 1 CMGT 244 Week #5 DQ 2 CMGT 244 Week #5 DQ 3 CMGT 244 Week #5 DQ 4 CMGT 244 Week 1 DQs CMGT 244 Week 2 DQs CMGT 244 Week 2 Assignment CMGT 244 Week 3 DQs CMGT 244 Week 3 Assignment Establishing a Secure Computer Room CMGT 244 Week 4 DQs CMGT 244 Week 4 Assignment Intro to OSI Model CMGT 244 Week 5 DQs CMGT 244 Week 5 Final Project Information Security Policy for the Bloom Design Group Paper CMGT 244 Week 5 Information Security Policy for the Bloom Design Group Presentation PPT A++ graded !! CMGT 244 ENTIRE COURSE http://www.homeworkproviders.com/shop/cmgt-244-entire-course/ CMGT 244 ENTIRE COURSE Product Description ...

Words: 532 - Pages: 3

Free Essay

Engm 244 Journal #8

...Ashton Bricker Journal #8 12 March 2015 Professor Jordan told us this week that in order to fix the blind area of the Johari window, you need to get feedback. I have seen this put into action in life. One time in middle school, there was a day where one of my friends had really smelly breath. To try and help her one of my other friends went up to her and told her as nicely as possible that her breath didn’t smell that great and gave her a piece of gum. That turned out to be one of the best things she could have done because the one girl was completely unaware that her breath smelled bad. After seeing how this helped, I will always try to get as much feedback as possible and to give feedback to people when they need it. Another important thing Professor Jordan told us was that you should keep your private life to yourself at work. I completely agree with this. I once had a guy I worked with that talked about his personal life at work way too much. One day he ended up over sharing some things he shouldn’t have and the boss never quite forgot it. Eventually the guy lost his job. Because I know the effect that over sharing can have on your job, I will try not to talk about my personal life at work. Lastly, Professor Jordan told us that one drink should be the max at an office party. I think this is a good idea. I have seen many of my friends have too many drinks and then tell anyone who will listen all about their personal life. They usually end up sharing something way...

Words: 1032 - Pages: 5

Premium Essay

Lab 1 244 Class

...Dre King Lab 1.1 1. I am hosting with the IT260-PL-A computer. 2. The system prompts me to initialize Disk 1 to prepare it for use. 3. The Disk 1 type and status change and Disk 1 now usable. 4. Disk 1 doesn’t appear in the volume disk pane at the top of the console because it is unallocated. 5. Extend, shrink, and mirror are the volume sizing options that are available in the context menu. 6. I am actually able to extend the Data 2 volume to Disk 1, because I have 10 GB unallocated. 7. It is necessary to convert both disks to dynamic, so that it can have options. 8. The C: drive to Disk 1 cannot be extended because it is the system drive holding the operating system. 9. These tasks could be completed using Server Manager instead of other consoles: * Roles * Features * Configure * Storage * Diagnostics 10. Based on the information in the main Server Manager display, these roles are currently installed on the computer: * Active Directory Domain Services (AD DS) * Dynamic Host Configuration Protocol (DHCP) * Domain Naming Service (DNS) 11. AD DS, DHCP, and DNS are features currently installed on the computer. 12. 13. On the right side of the Add Roles Wizard, it gives a description of file services. After clicking NEXT, it shows Introduction File Services, Things to Note, and Additional Information. 14. When I select the Windows Search Services checkbox, the window shows a description of that role. 15. When I select...

Words: 294 - Pages: 2

Premium Essay

Engm 244 Final Paper

...Matthew Thompson Final Paper ENGM 244 Section 4 Introduction As the new CEO of HoloSolar Industries I am excited to help the firm realize its full potential as a profitable and fast-growing company. I have studied the inner workings of the company, and I plan to give the board unbiased, honest recommendations based on my findings. Hopefully the implementation of my proposals will help rectify the current state of affairs at HoloSolar Industries and restore its success, as filing Chapter 11 bankruptcy is not an advisable option. I would like to now provide a better understanding of where these recommendations come from. Results from the Myers-Briggs Type Indicator (MBTI) place me in the ISTJ category. This type of person is typically viewed as someone whose decision-making is thorough and logical, and who takes “pleasure in making everything orderly and organized” (Myers-Briggs). I received a high consideration score (72) on my personal LOQ (Leadership Opinion Questionnaire), an attribute which should be beneficial for a company struggling with discontented employees. A high compliance score on my DISC assessment relates to the importance I place in technical, careful, and accurate work – a testament that reinforces my MBTI result. Of course my proposal is based on more than just these personality tests. While attending Vanderbilt University I studied applied behavioral science within the engineering management discipline, an experience from which I draw much of my expert...

Words: 2855 - Pages: 12