Access Control Strategies Introduction In this assignment, you will develop strategies to protect the data and file systems of a fictitious software development company.The spe
Access Control Strategies
Introduction
In this assignment, you will develop strategies to protect the data and file systems of a fictitious software development company.The specific course learning outcome associated with this assignment is:
- Determine an access control strategy based on existing documents.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
Scenario
Independent Software Incorporated (ISI) is a small software development company with eight employees that work at the home office. Their primary accounts are associated with major market retailers, the federal government, and large state governments. The computer environment for ISI contains a Linux file and print server, a Linux Web server, and ten heterogeneous workstations running multiple operating systems. ISI's coding development projects often encompass classified information and personally identifiable information (PII).
Instructions
Write a 2- to 4-page paper in which you:
- Explain why ISI needs an access control plan and the goals of the plan, citing specific, credible sources that support your assertions and conclusions.
- Develop at least three layered access security strategies that can be used to protect ISI's data at rest, data in motion, and file systems; citing specific, credible sources that support your proposed strategies.
- Explain a best practice process and procedures for implementing ISI's access security strategies and the overall framework in which they will reside, citing specific, credible sources that support your assertions and conclusions.
- Describe the verification process that can be used to ensure that ISI's access control plan is effective, citing specific, credible sources that support your assertions and conclusions.
- Explain how ISI's verification process will be maintained and updated in response to future changes in access requirements.
- Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
- Cite each source listed on your source page at least one time within your assignment.
- For help with research, writing, and citation, access the library or review library guides.
- Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
- Use section headers in your paper to clearly delineate your main topics.
Unacceptable NeedsImprovement Competent Exemplary
Explain why a particular organization needs an access control plan and the goals of the plan, citing specific, credible sources that support one's assertions and conclusions.
0 (0.00%) Did not submit or complete the assignment.
12.15 (13.50%) Provided a vague or implausible explanation of why a particular organization needs an access control plan, and/or the goals of the plan.
13.77 (15.30%) Explained why a particular organization needs an access control plan and the goals of the plan.
16.2 (18.00%) Explained why a particular organization needs an access control plan and the goals of the plan, citing specific, credible sources that support one’s assertions and conclusions.
Develop at least three layered access security strategies that can be used to protect an organization's data at rest, data in motion, and file systems; citing specific, credible sources that support the proposed strategies.
0 (0.00%) Did not submit or complete the assignment.
12.15 (13.50%) Developed at least three layered access security strategies, one or more of which will not adequately protect an organization's data at rest, data in motion, or file systems.
13.77 (15.30%) Developed at least three layered access security strategies that can be used to protect an organization's data at rest, data in motion, and file systems.
16.2 (18.00%) Developed at least three layered access security strategies that can be used to protect an organization's data at rest, data in motion, and file systems; citing specific, credible sources that support the proposed strategies.
Name: w02a2
Description: Access Control Strategies ExitExit
Grid View List View
7/11/22, 7:11 PM Page 1 of 4
Explain a best practice process and procedures for implementing an organization's access security strategies and the overall framework in which they will reside, citing specific, credible sources that support one’s assertions and conclusions.
0 (0.00%) Did not submit or complete the assignment.
12.15 (13.50%) Provided a vague or implausible explanation of a process and procedures for implementing an organization's access security strategies and/or the overall framework in which they will reside.
13.77 (15.30%) Explained a process and procedures for implementing an organization's access security strategies and the overall framework in which they will reside.
16.2 (18.00%) Explained a best practice process and procedures for implementing an organization’s access security strategies and the overall framework in which they will reside, citing specific, credible sources that support one's assertions and conclusions.
Describe a verification process that can be used to ensure that an organization's access control plan is effective, citing specific, credible sources that support one’s assertions and conclusions.
0 (0.00%) Did not submit or complete the assignment.
12.15 (13.50%) Described a verification process that can be used but which is unlikely to ensure that an organization's access control plan is effective. or capable of being maintained and updated for future changes in access requirements.
13.77 (15.30%) Described a verification process that can be used to ensure that an organization's access control plan is effective.
16.2 (18.00%) Described a verification process that can be used to ensure that an organization's access control plan is effective, citing specific, credible sources that support one’s assertions and conclusions.
Explain how an access control plan verification process will be maintained and updated in
0 (0.00%) Did not submit or complete the assignment.
12.15 (13.50%) Described an access control plan verification process that is
13.77 (15.30%) Explained how an access control plan verification
16.2 (18.00%) Explained how an access control plan verification
7/11/22, 7:11 PM Page 2 of 4
updated in response to future changes in access requirements, citing specific, credible sources that support one's assertions and conclusions.
process that is incapable of being maintained and updated in response to future changes in access requirements.
verification process will be maintained and updated in response to future changes in access requirements.
verification process will be maintained and updated in response to future changes in access requirements, citing specific, credible sources that support one’s assertions and conclusions.
Support main points, assertions, arguments, or conclusions with at least four high- quality academic references.
0 (0.00%) Did not submit the assignment or provide any references.
3.375 (3.75%) Did not cite the required number of references and/or one or more sources did not support main points, assertions, arguments, or conclusions.
3.825 (4.25%) Cited the required number of references, but one or more sources did not support main points, assertions, arguments, or conclusions
4.5 (5.00%) Supported main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
Write clearly and concisely in a manner that is well- organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
0 (0.00%) Did not submit the assignment; or writing lacked clarity and organization, was grammatically incorrect, and contained numerous spelling, typographical, and/or punctuation errors.
3.375 (3.75%) Writing lacked clarity or organization, with grammatical, spelling, typographical, formatting, and/or punctuation errors that inhibit readability and detract from the overall message.
3.825 (4.25%) Wrote clearly and concisely in a manner that is well-organized; grammatically correct; and nearly free of spelling, typographical, formatting, and/or punctuation errors.
4.5 (5.00%) Wrote clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
7/11/22, 7:11 PM Page 3 of 4
Name:w02a2
Description:Access Control Strategies ExitExit
7/11/22, 7:11 PM Page 4 of 4
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
