Preview

Unit 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
271 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Assignment 1
Unit 1 Assignment 1: Identification, Authentication, and Authorization Techniques

A = Assigned to the user F = Needed for primary function
T = Temporary N = Never
BP = By Position Assigned RO = Read Only
Segregation of Duties Matrix

(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
A
A
A
A
A
A
A
A
Shipping
A
A
A
A
A
A
A
A
Sales
A
A
A
A
A
A
A
A
Accounts Payable
A
A
A
A
A
A
A
A

Segregation of Duties Matrix

(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
N
N
RO
F
N
RO
T
N
Shipping
T
F
RO
RO
F
RO
T
N
Sales
F
N
RO
RO
N
RO
T
N
Accounts Payable
BP
N
RO
N
N
RO
T
N

What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
Jennifer had access to everything to the system because she’s considered as an asset to the company as well as helping the company profit, it was only right to give her as much access to the system to better the company’s profit margins. But that will give her more power to the accounts than she actually needs.
What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
With Lloyd’s account having access to everything, he’s has access to things he really doesn’t need.
What are the requirements for Buster and LuEllen?
The only real access they need is to the shipping department in order to ship out the customers’ requests.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    unit 5 assignment1

    • 309 Words
    • 2 Pages

    What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1230 Lab 4

    • 56 Words
    • 1 Page

    1. What tasks can you perform in the J.Adams Properties dialog box that you could not perform in the User Accounts control panel?…

    • 56 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3. Which departments will need what permissions as far as access to computers, printers, and scanners?…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 1

    • 383 Words
    • 2 Pages

    Video Connectors – Video Graphics Adapter (VGA), Digital Video Interface (DVI), and S-Video (TV connection)…

    • 383 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    The evolution of the Ethernet standards will have a large effect on data storage requirements. As the speeds of these connections continue to increase, users and businesses will be able to transfer larger files faster and will required larger data storage to accommodate the increased demand of resources. Thirty years ago, when the standard was only 10MB, there was nowhere near the need for the data storage capacity as there is today, with the current standard being 100 Gbit, with 1 Tbit on the way. Data storage wasn’t as high in demand before because it would take an extremely long amount of time to transfer large files, but as the speed increases, so will the demand.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    Unit 3 Assignment 1

    • 375 Words
    • 2 Pages

    1. Research the following organizations and explain their involvement with the Internet public IP addresses:…

    • 375 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment

    • 80 Words
    • 1 Page

    In the unit 1 assignment, we defined the relations and keys for a library system. In unit 2 we learned about constraints. For your unit 2 assignment, identify and describe the constraints that would be appropriate for the relations that we have within our library system. Constraints that you should consider may include:…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    2). In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan?…

    • 592 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment 1

    • 266 Words
    • 1 Page

    The Johnson Company can do several things to reach out to new customers. Even though many companies still use them, the yellow pages are all but obsolete and viewed by a low number of people. Most companies utilize websites and social media to attract customers. The Johnson Company can create these to get their name out on the internet. In conjunction with these websites, they could utilize web advertising services such as Google advertisements or banner ads. Additionally, they could contact their local cable providers to film commercials to air on television.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 253 Words
    • 2 Pages

    3) Why would this affect child labor-Why is the labor force utilizing children-shouldn’t they be in school…

    • 253 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 assignment 1

    • 405 Words
    • 2 Pages

    1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve?…

    • 405 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    P1 Unit 3 Assignment

    • 582 Words
    • 3 Pages

    A multimedia essay combines textual content and multimedia elements to create a unique and inventive version of an essay to share with others. In this activity, you will use textual material from your literary essay and multimedia elements such as sound, layout, video, images, web-quests, etc. to create a unique version of your essay to share with your classmates.…

    • 582 Words
    • 3 Pages
    Satisfactory Essays