- Describe identification, authentication, and authorization.
- Explore whether or not you would use Windows ACLs and explain your reasoning.
- Evaluate best practices for managing Microsoft Windows and application vulnerabilities.
Keep in mind, we are more interested in your ability to describe the steps you would take to review security goals than providing an answer to this scenario. Remember the strategy of Think, Plan, Design, Implement, and Evaluate.
Deliverables:
Paper should be 4-5 pages in length and formatted according to APA style guidelines. Use at least two scholarly sources.
Answer preview
In every company or organization, the security controls and its information systems are crucial tools that must undergo scrutiny to ensure continued efficiency. Scrutiny always ensure that the security for the company’s data is always protected from vulnerabilities such as access by unauthorized persons or mishandling. During the scrutiny process, some terms used include identification, authentication, and authorization which are all security protocols that help regulate the users that access the system and the information they access. During the use of Windows products, the concept of Windows ACLs arise whereby these are access lists that contain an…