Assume you are a manager in a large international organization. You have been asked to assess the company’s information systems and security controls.
- Describe identification, authentication, and authorization.
- Explore whether or not you would use Windows ACLs and explain your reasoning.
- Evaluate best practices for managing Microsoft Windows and application vulnerabilities.
Keep in mind, we are more interested in your ability to describe the steps you would take to review security goals than providing an answer to this scenario. Remember the strategy of Think, Plan, Design, Implement, and Evaluate.
Deliverables:
Paper should be 4-5 pages in length and formatted according to APA style guidelines. Use at least two scholarly sources.
Answer preview
Windows ACLs are lists of control entries that identify trustees and specifies the rights of access allowed or denied as per the access of objects of a system. The use of ACLs in the organization presents a wide range of advantages to users and the information in the company’s system. Some of the advantages of using ACL include prevention of theft. ACLs act as restricting tools that keep off any unauthorized parties from accessing any component in the company’s system which means that any party with an intention to steal or edit information in the framework is locked out from accessing it because they do not have the necessary credentials to be authenticated.
[1314 Words]