Preview

IS3230 Unit 4 Assignment 1 Chris Wigint

Powerful Essays
Open Document
Open Document
1211 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3230 Unit 4 Assignment 1 Chris Wigint
IS3230 Unit 4 Assignment 1
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
14 April, 2014

Access Control Plan
INTRODUCTION
This Dragon Net Solutions (DNS) Access Control and Account Management Plan details the access control and account management activities for Dragon Net Solutions. It facilitates compliance with the National Institute of Standards and Technology’s (NIST) Recommended Security Controls for Federal Information Systems (NIST 800-53) and the NIST Guide for Accessing the Security Controls in Federal Information Systems (NIST 800-53A). Specifically, the following NIST Access Controls (AC) are addressed:
AC-1 Access Control Policy and Procedures
AC-2 Account Management
AC-3 Access Enforcement
AC-5 Separation of Duties
AC-6 Least Privilege
This Plan also relates to three
Dragon Net Solutions (DNS)
Date: April 14, 2014
SECURITY IMPLEMENTATION
Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:
CTSP/SA
Privileged User
Basic User
ACCESS CONTROL REQUIREMENTS
All access control requirements are commensurate with the user’s duties at a particular incident. For DNS, access control is implemented in accordance with the following principles:
Access Enforcement
Least Privilege
Separation of Duties
ACCESS ENFORCEMENT
Automated Rules of Behavior (ROB) are implemented. There are three different ROBs:
1. Privileged: Users with DB Admin role
2. DNS: Users without DB Admin role who are DNS employees
3. Non-DNS: Users without DB Admin role who are not DNS employees. This includes MAD employees.
Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer’s full time position as Sales would need Sales access for her primary position. She should only have By Position access to Accounts Payable when she is working that position. She would need Read Only for Shipping and Receiving in order provide customers with information on inventory availability. Neither of her positions should have required her to have full access to Shipping and Receiving.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.…

    • 515 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    TrueCrypt is loaded with powerful features that users concerned with protecting data from prying eyes will find robust and comprehensive. It has 11 algorithms for encrypting your private files in a password-protected volume. You can store your encrypted data in files (containers) or partitions (devices). TrueCrypt works offers powerful data protection, recommending complex passwords, explaining the benefits of hidden volumes, and erasing telltale signs of the encryption process, including mouse movements and keystrokes. Though the interface may not be intuitive, its powerful, on-the-fly encryption for no cost still earns the freeware security tool a top rating.…

    • 515 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * The hackers can gain access to a company’s payment processing network. The attackers then installed malicious code designed to gather sensitive information from the network, which allowed them to easily access the network at their convenience.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 1 Assignment

    • 1325 Words
    • 6 Pages

    In all, Figure 4 shows a calculation of 64% accuracy rate for correct answers given in his small reading group. I could tell that Michael felt like he was on a roll, and he made a surprising request that none of his peers groaned about. “Can we finish by ourselves?” The teacher gave consent for the class to finish independently, and they did. As an added bonus, the reading specialist shared an entire sheet of heart stickers made by her husband to celebrate Valentine’s Day early. Michael happily received his reward while trying to estimate the total stickers on the sheet (see Figure 5). When he saw the red heart, he stated, “I don’t want the heart to camouflage on my red sweater.” Therefore, Michael placed the heart on his white collar (see Figure 6).…

    • 1325 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Is3350 Unit 1 Assignment

    • 653 Words
    • 3 Pages

    1. Once I have completed my current courses I will apply for TPP mathematics level C or enrol in an Accounting degree.…

    • 653 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The User Domain is the most important because the user can easily create a problem within the network, therefore can be considered the weakest link. The user domain defines the people who access an organizations network and IT infrastructure. In the user domain you will find an acceptable use policy, also known as an AUP. An AUP defines what a user can and cannot do within the organization. Some of the don’ts include but are not limited to malicious emails to and from other co-workers, breaking security policies by entering co-workers workstations, inappropriate web browsing that can lead to viruses, as well as uploading and downloading music,…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The User Domain defines the people who have permissions to a company’s information system. This domain contains all of the user information and will enforce an Acceptable Use Policy (AUP) that will define what each user has permissions to do with any company data that they may have access to. This domain is not the strongest link in any company’s infrastructure.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Which of the following is a stand-alone malicious software program that actively transmits itself, generally over networks, to infect other computers?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Access Control Modules

    • 489 Words
    • 2 Pages

    Confidential Services Inc. should use Role Based Access Control (RBAC) since they are a military network. With this access control, the security procedures would be assigned to each user and observed by the security administrators. RBAC would allow for top grade security as well as its manageability functions. By allowing each of the users a set of particular permissions in their group or role, it helps the administrator do his/her job more effectively and monitor the security by groups.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Head First

    • 1831 Words
    • 8 Pages

     Each access level and its tasks are different. A staff member cannot access the…

    • 1831 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Role Mining - Revealing Business Roles for Security Administration using Data Mining Technology Martin Kuhlmann Dalia Shohat SYSTOR Security Solutions GmbH Hermann-Heinrich-Gossen-Strasse 3 D 50858 Cologne [martin.kuhlmann|dalia.shohat] @systorsecurity.com Gerhard Schimpf SMF TEAM IT-Security Consulting Am Waldweg 23 D 75173 Pforzheim Gerhard.Schimpf@smfteam.de ABSTRACT In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) based on already existing access rights patterns in their production IT-systems. The core of this paper creates a link between the use of well established data mining technology and RBAC. We present a process for detecting patterns in a data base of access rights and for deriving enterprise roles from these patterns.…

    • 5822 Words
    • 24 Pages
    Powerful Essays