Looking for a similar answer, essay, or assessment help services?

Simply fill out the order form with your paper’s instructions in a few easy steps. This quick process ensures you’ll be matched with an expert writer who
Can meet your papers' specific grading rubric needs. Find the best write my essay assistance for your assignments- Affordable, plagiarism-free, and on time!

Posted: January 6th, 2024

Access Control Systems

Question description

All submissions need to closely adhere to the below listed criteria; I will be stringent on accepting work. ---------------------------------------------------------------------------------------------------Objective:  Identify, formulate, and solve technical and policy challenges in an InfoSEC position.
Background: Dave Dandy, Owner of
David’s Dandy Doohickies (D.D.D.) has noticed that several of the
intranet servers are located in the system administrator’s cube and have
been for 3 months. The servers include these servers:  a
web server that hosts the HR system; an internal email server that
routes mail destined for the “outside” to the world facing server in the
DMZ; and an internal only ftp server used to hold proprietary design
information on the new lone of framastats that D.D.D is developing.
The current server room at D.D.D. has no locks, cameras, or access lists.  In fact, it still resembles the warehouse that it is housed in, lacking even a rudimentary fire extinguisher system.  While there is a tape backup process, labels consist of small notes taped to each backup tape.  There
is also no centralized log management; list of who has administrative
rights on any of the servers in the server room or outside the
administrator’s cube.
Instructions: Remember there are three types of controls: administrative, technical, and policy.  You first need to identify all of the security issues with D.D.D.  Divide the issues identified into the three control categories.  Each issue may over lap the categories and often do.  For each issue, identify a specific technique in that control category to mitigate the issue.  This is most easily done with a matrix but there are certainly many other acceptable ways. 
You should seek controls that will provide the most security effectiveness for the money.  That said, Dave will listen to reasonable proposals for spending his money.
Deliverables:
Submit a matrix or other suitable way of expressing the relationship between issue, type of control, and type of mitigation.  Use proper citations when appropriate, so a reference page will also be required.  Remember
that security must be cost effective as well as effective so use wisdom
when deciding to use a control or a mitigation technique.
While there are non-access control issues that you may
include, the focus should be on those issues related to access control
as we have discussed during this course.
Example Deliverable:
Note: this example may or may not follow the citation rules used by the school.  You need to check the proper citation rules for yourself. 
An organization has decided to implement a stronger password management system.  For this one issue, a matrix could look like this:

What Citation Styles Can You Use for My Essay?

Students often ask, “Can you write my essay in APA or MLA?”—and the answer’s a big yes! Our writers are experts in every style imaginable: APA, MLA, Chicago, Harvard, you name it. Just tell us what you need, and we’ll deliver a perfectly formatted paper that matches your requirements, hassle-free.

Issue

Administrative

Technical

Physical

Is It Legal to Use Your Writing Service?

Absolutely, it’s 100% legal! Our service provides sample essays and papers to guide your own work—think of it as a study tool. Used responsibly, it’s a legit way to improve your skills, understand tough topics, and boost your grades, all while staying within academic rules.

Password security

Establish policy to require minimum length of 14 characters, mixed case and special characters (1997)

Enforce policy using PAM (2004).

How Much Does It Cost to Get a Paper Written?

Our pricing starts at $10 per page for undergrad work, $16 for bachelor-level, and $21 for advanced stuff. Urgency and extras like top writers or plagiarism reports tweak the cost—deadlines range from 14 days to 3 hours. Order early for the best rates, and enjoy discounts on big orders: 5% off over $500, 10% over $1,000!

Use OTP token to provide multi-factor RSA (2006)

Explanation of mitigation:
Pluggable
Authentication Module (PAM) will allow verification and enforcement of
more complex password rules than provided for in our current
authentication system.
A One Time Password (OTP) token such as MyPw will allow inexpensive multi-factor authentication (www.MyPw.com).
References
(1997). "RFC-2196, Site Security Handbook." Request for Comments  Retrieved February 8, 2005, from http://www.ietf.org/rfc/rfc2196.txt.
(2004) OATH Reference Architecture Release 1.0.  Volume,  DOI:
RSA (2006). Making the FFIEC Guidance Operational, Balancing Authentication Methods with Online Banking Risk, RSA.

Tags: Academic Paper Assistance, Assignment Help Australia, Cheap Essay Writing Service, Dissertation Writing Services

Order|Paper Discounts

Why Choose Essay Bishops?

You Want The Best Grades and That’s What We Deliver

Top Essay Writers

Our top essay writers are handpicked for their degree qualification, talent and freelance know-how. Each one brings deep expertise in their chosen subjects and a solid track record in academic writing.

Affordable Prices

We offer the lowest possible pricing for each research paper while still providing the best writers;no compromise on quality. Our costs are fair and reasonable to college students compared to other custom writing services.

100% Plagiarism-Free

You’ll never get a paper from us with plagiarism or that robotic AI feel. We carefully research, write, cite and check every final draft before sending it your way.