(Solved Homework): Can someone help me with the following:…

Can someone help me with the following:

Part 1: For the scenarios that follow, identify the data that would need to be protected. Recommend how you would implement one or more of the access controls for the given scenario. Justify your recommendations.

Don't use plagiarized sources. Get Your Custom Essay on
(Solved Homework): Can someone help me with the following:…
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

Scenarios:

A small construction company consisting of 12 computers that have Internet access.

A small advertising company consisting of 12 computers that have Internet access.

All employees communicate using smartphones.

A multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.

A defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail.

A military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using BlackBerry devices and e-mail.

Part 2: Select an access control model that best prevents unauthorized access for each of the five scenarios . Which types of logical access controls should be used in each scenario? Justify your recommendations.

Access control models:

Mandatory access controls

Discretionary access controls

Role-based access controls

Rule-based access controls

Content-dependent access controls

Nondiscretionary access controls

Access Controls

Administrative controls: Policies approved by management and passed down to staff, such as policies on password length.

Logical/technical controls: Control access to a computer system or network, such as a username and password combination

Hardware controls: Equipment that checks and validates IDs, such as a smart-card for or security token for multifactor authentication.

Software controls: Controls embedded in operating system and application software, such as NTFS permissions.

Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door

Expert Answer

 

Part 1

The one which needs protection is A military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers using MAC.

This is because it has following benefits:

Through its implementation of Bell-LaPadula in Multi-Layer Secure (MLS) systems, MAC is the main access control model used by the military and intelligence agencies to maintain classification policy access restrictions. The combination of Bell-LaPadula and trusted component assurance also has the nice benefit of making MLS systems immune to Trojan Horse attacks. In perfect implementations, MLS systems implementing Bell-LaPadula MAC are not susceptible Trojan Horse forced security violations because users do not have the ability to declassify information. Additionally, MAC is relatively straightforward and is considered a good model for commercial systems that operate in hostile environments (web servers and financial institutions) where the risk of attack is very high, confidentiality is a primary access control concern, or the objects being protected are valuable

Part 2:

1. A small construction company consisting of 12 computers that have Internet access.and A small advertising company consisting of 12 computers that have Internet access.

To protect this we use LDAP (Lightweight Directory Access Protocol).LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate intranet

This is recommended because by implementing LDAP enviornment using Windows Active Directory, a small private firm can better secure its information, manage the information more efficiently and enable remote access for its field employees

For A multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively we use Role Based Access Control because

Role Based Access Control is an approach that is more realistic and aligned with most business models. Analyst and administrators look at the actual role that the end user will be taking. This approach to security ‘looks’ at the end user and defines what they can or cannot do.Role-based access control (RBAC) is an access control method that organizations implement to ensure that access to data is performed by authorized users. Unlike other access control methods, role-based access control assigns users to specific roles, and permissions are granted to each role based on the user’s job requirements. Users can be assigned any number of roles in order to conduct day-to-day tasks. For example, a user may need to have a developer role, as well as an analyst role. Each role would define the permissions that are needed to access different objects.

For military purpose we use Mandatory Access Control

The process is when the owner (above) defines a policy or policies that can strictly define the end user and their use of programs or files. Because MAC is typically used in the defense industry, this ensures that documents or files are secured.

Homework Ocean
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.

× Contact Live Agents