computer security566#6

0 comments

 

Assume you are a manager in a large international organization. You have been asked to assess the company’s information systems and security controls.

•Describe identification, authentication, and authorization.

•Explore whether or not you would use Windows ACLs and explain your reasoning.

•Evaluate best practices for managing Microsoft Windows and application vulnerabilities.

 

Keep in mind, we are more interested in your ability to describe the steps you would take to review security goals than providing an answer to this scenario. Remember the strategy of Think, Plan, Design, Implement, and Evaluate.

 

Deliverables:

 

Your paper should be three pages long and formatted according to APA style guidelines. Use at least two scholarly sources and information from your module to support your decision and should be Original without similarity.

 

 

Resources that can help you:

 

Textbook : Security Strategies in Windows Platforms and Applications by Michael G. Solomon

 

Agrawal, H., Thakur, A., Slathia, R., & Jeyanthi, N. (2015). User Authentication Scheme in Cloud Computing. International Journal of Applied Engineering Research, 10(8), 20767-20778.

 

Vasanthi, R., Bhavani, R., Dhanalakshmi, S., & Kalpana, K. (2015). Privacy and Secure Revocable Data Access Control in Multi-Authority Cloud. International Journal of Applied Engineering Research, 10(6), 14351-14356.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}