Question

In: Computer Science

An organization uses SSO authentication for employee access to network resources. When an employee resigns, as...

An organization uses SSO authentication for employee access to network resources. When an employee

resigns, as per the organization’s security policy, the employee’s access to all network resources is terminated immediately. Two weeks later, the former employee sends an email to the help desk for a password reset to access payroll information from the human resources server. Which of the following represents the BEST course of action?

  1. Approve the former employee’s request, as a password reset would give the former employee access to only the human resources server.
  2. Deny the former employee’s request, since the password reset request came from an external email address.
  3. Deny the former employee’s request, as a password reset would give the employee access to all network resources.
  4. Approve the former employee’s request, as there would not be a security issue with the former employee gaining access to network resources.

_________________________________________________________________________________________________________________________________

Phishing emails frequently take advantage of high-profile catastrophes reported in the news. Which of the following principles BEST describes the weakness being exploited?

  1. Intimidation
  2. Scarcity
  3. Authority
  4. Social proof

_____________________________________________________________________________________________________________________________________

An organization is working with a cloud services provider to transition critical business applications to a hybrid cloud environment. The organization retains sensitive customer data and wants to ensure the provider has sufficient administrative and logical controls in place to protect its data.

In which of the following documents would this concern MOST likely be addressed?

  1. Service level agreement
  2. Interconnection security agreement
  3. Non-disclosure agreement
  4. Business process analysis

Solutions

Expert Solution

1. option C

Since the authentication is SSO (Single Sign-On), a change in the password once to the former employee will give him access to the rest of the network, which is a security and data hazard.

2. option A

Phishing emails generally target their user with a sense of urgency and try to show that some threat or harm is on the way. This intimidates the user to click on the malicious links which infects the system with the malware.

3. option B

ISA is a document that handles and regulates security-relevant aspects of an intended connection between an agency and an external system. It manages the security interface between any two systems operating under two different authorities handling the task. It includes a variety of descriptive, technical, procedural, and planning information. It is usually performed in a succession of a formal MOA/MOU that defines high- level roles and responsibilities in the management of a cross-domain connection.


Related Solutions

Network Organization Model Research a company that you believe uses a network organization model. Describe the...
Network Organization Model Research a company that you believe uses a network organization model. Describe the company, and explain why you think the company uses a network organization model, Answer in 7-10 sentences. For each website you visit to find information, if you use that information be sure to put it in your own words and include that website as a reference in APA format. Learning Organization Research a company that you believe is a learning organization. Describe the company,...
Databases make it easy for people in an organization to access customer, employee, and business information,...
Databases make it easy for people in an organization to access customer, employee, and business information, some of which is private. What are the ethical and legal implications that must be considered as a result of this? Should organizations police themselves, or should there be government regulations surrounding who can access this content in an organization? Discuss the dilemmas this presents for business organizations, and provide examples to illustrate your ideas.
How is Access and use of technology resources addressed in an organization? Do you have any...
How is Access and use of technology resources addressed in an organization? Do you have any suggestions for improvements?
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which...
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which of the following attack vectors would the attacker MOST likely use? Capture a three-way handshake and crack it. Capture a mobile device and crack its encryption. Create a rogue wireless access point. Capture a four-way handshake and crack it.
Authentication controls can be used to verify the identity of the person attempting to access an...
Authentication controls can be used to verify the identity of the person attempting to access an AIS. Identify the different types of authentication controls, the problems related to each control and how they can be used to provide effective protection from unauthorised access to an AIS.
Most IT professionals are familiar with the basic concepts surrounding authentication and access control systems. There...
Most IT professionals are familiar with the basic concepts surrounding authentication and access control systems. There are fewer professionals who have taken the time to consider the more granular characteristics of these controls and the options that are available for differentiation, selection, and implementation. Describe the combination of authentication and access controls that you believe best balance cost, complexity, and security. Support your position. Explain how domain trusts, isolation technologies, and the separation and organization of those technologies can support...
A server is a computer or device on a network that manages network resources. Servers are...
A server is a computer or device on a network that manages network resources. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks. On multiprocessing operating systems however, a server may be one of several programs that are each managing specific requests for services from clients or a particular hardware or software resource, rather than the entire computer. For each of the server types below, provide a short description of the service each provides...
Describe the difference between authentication and access control. How do each of these concepts support the...
Describe the difference between authentication and access control. How do each of these concepts support the confidentiality and integrity of the data they protect? How does the “principle of least privilege” increase this support on the access control side? Describe how multi-factor authentication increases the confidence that someone is who they claim to be (i.e. that the person logging in is actually that person.)
Evaluate the strengths and weakness of the following authentication categories: passwords, access cards, and biometrics. Which...
Evaluate the strengths and weakness of the following authentication categories: passwords, access cards, and biometrics. Which do you think works best? Why? You should list strengths and weaknesses for each and explain your thoughts on what works best.
Introduction - Please briefly explain what is meant by Access control/Authentication/Authorization, the role this plays in...
Introduction - Please briefly explain what is meant by Access control/Authentication/Authorization, the role this plays in securing a network and the importance of having policies about Account naming conventions and password management. Account naming convention - What are the suggested format(s) for user accounts to be named? i.e. johndoe, jdoe, john.doe, user1, etc.... Be sure that your account naming convention provides a way to create a unique account name for folks with the same names.   Password length and complexity -...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT