Question

In: Computer Science

Assume that you are an IT Security Manager who needs to develop access control policies for...

Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.Assume that you are an IT Security Manager who needs to develop access control policies for the following areas: networking, server administration, database administration, and physical security. Choose one area and develop five actual policies that you could provide your employees. Please explain your choices and why these policies are important.

Solutions

Expert Solution

Please upvote if you are able to understand this and if there is any query do mention it in the comment section.

Access control policies for physical security are as follows:

  1. Having multiple levels for access to the employees. Giving access to the employees to access the authority into certain parts of the organization. The employees will be given access to only the designated areas which are concerned with their work and will restricted from the rest of the areas.
  2. The employees who are given access in areas to other areas than designated areas will be closely monitored and will be required to issue a badge for such operations.
  3. Each and every employee will be authorized based on the access control which will be cloud based. Cloud based authentication will be much faster and can be easily revoked for any employee and all the credentials of the employees will be safe in the cloud.
  4. Every employee before entring thorugh any door will be required to be authenticated. And once the employee will be authenticated from the credentials in the cloud then the doors will remotely unlock and on unmatch they will not.
  5. Cloud based data will help in giving certain permissions to the employees to enter the designated areas based on their jobs very easily and also it will help in monitoring the employees.

If this is required in some other way or some more information is required regarding this then please mention in the comment section otherwise please upvote.


Related Solutions

You can use up to three levels of security and protection to control who can access...
You can use up to three levels of security and protection to control who can access and change your Excel data. Please describe two of the three levels and how you access each of them.
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
How are access control policies different between industries?
How are access control policies different between industries?
Develop, assess, and document security policies, practices, and procedures?
A-2 Develop, assess, and document security policies, practices, and procedures?C-1 Identify and assess current and anticipated security risks and vulnerabilities?C-2 Evaluate current and emerging tools and technologies?
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
Having security policies and procedures that document and manage access to critical data and technology is...
Having security policies and procedures that document and manage access to critical data and technology is one thing, but actually controlling the access is another. Describe and evaluate how authentication controls can enforce security policies within an organization.
identify the needs of health care in America, access the proposed policies, design a portion of...
identify the needs of health care in America, access the proposed policies, design a portion of a health care plan that will work for America
Assume that you are working as an Accounts Manager in AB ACCESS LIMITED, a company engaged...
Assume that you are working as an Accounts Manager in AB ACCESS LIMITED, a company engaged in providing supervision services for construction projects. The management of the company is concerned about cash flow of the business and have asked you to prepare a statement of cash flow showing how much cash flow occurred in the operating, investing and financing activities of the business during the financial period ended 30 June 2018. Particulars 2017 £ 2018 £ Assets Cash                   20,000...
in ACL (access control List) : 1.How do you determine who can access object x? 2....
in ACL (access control List) : 1.How do you determine who can access object x? 2. How do you determine which objects user y can access? 3. What happens if a file is deleted?
For Network Access Control and Cloud Security (Cloud Database Encryption Technology Based on Combinatorial Encryption) You...
For Network Access Control and Cloud Security (Cloud Database Encryption Technology Based on Combinatorial Encryption) You are required to research and report on this topic according to the Detail of Question below. A. understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT