Access Control Proposal
This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:
The ability to discern when a risk assessment should be performed and carrying out the task
Understanding user or customer access requirements, whether remote or local
Using a layered security approach to establish and maintain access controls
Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks ...view middle of the document...
Mitigate risks from unauthorized access to IT systems through proper testing and reporting.
Required Source Information and Tools
The following resources are required to complete this project:
Text sheet: IS404: Unit 1 Integrated Distributors Incorporated (provided in Unit 1)
A computer with:
Access to the ITT Tech Virtual Library
Access to the Internet
Microsoft (MS) Office Suite—MS Word, MS PowerPoint, and MS Visio or any other comparable editing, presentation, and drawing software
Note-taking systems, such as pens, paper, and printers
The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on all your interim work done. In this project, you have two such ungraded checkpoint deliverables, in Units 3 and 7, where either you may discuss your queries with the instructor or receive feedback from the instructor. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report that you need to
submit in Unit 11.
Checkpoint unit | Purpose of the checkpoint | Expected deliverables from thestudent |
1. Unit 3 | Understanding requirements Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion | Prepare an outline of issuesand potential solutions and discuss with your instructor/chief information officer (CIO). |
2. Unit 7 | Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion | Draft the report and thePowerPoint presentation to discuss with your instructor, the CIO. |
User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system
security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.
You are provided with the text sheet named “IS404: Unit 1 Integrated Distributors Incorporated” to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors...