Assessment of systems and control

Assessment of systems and control

Assessment of systems and control: Assume you are a manager in a large international organization. You have been asked to assess the company’s information systems and security controls.

  • Describe identification, authentication, and authorization.
  • Explore whether or not you would use Windows ACLs and explain your reasoning.
  • Evaluate best practices for managing Microsoft Windows and application vulnerabilities.

Keep in mind, we are more interested in your ability to describe the steps you would take to review security goals than providing an answer to this scenario. Remember the strategy of Think, Plan, Design, Implement, and Evaluate.

Deliverables:

Paper should be 4-5 pages in length and formatted according to APA style guidelines. Use at least two scholarly sources.

Answer preview
In every company or organization, the security controls and its information systems are crucial tools that must undergo scrutiny to ensure continued efficiency. Scrutiny always ensure that the security for the company’s data is always protected from vulnerabilities such as access by unauthorized persons or mishandling. During the scrutiny process, some terms used include identification, authentication, and authorization which are all security protocols that help regulate the users that access the system and the information they access. During the use of Windows products, the concept of Windows ACLs arise whereby these are access lists that contain an…
(1200 words)
Scroll to Top