Identified and authenticated.

Assume you are a manager in a large international organization. You have been asked to assess the company’s information systems and security controls.

Keep in mind, we are more interested in your ability to describe the steps you would take to review security goals than providing an answer to this scenario. Remember the strategy of Think, Plan, Design, Implement, and Evaluate.

Deliverables:

Your paper should be 4-5 pages in length and formatted according to Saudi Electronic University academic writing standards and APA style guidelines. Use at least two scholarly sources as well as information from your module to support your decision.

Answer preview

hectic for the administrator to implement restriction to various file resources (Biegala & Goiffon, 2015). But with the aid of the windows ACLs, it becomes efficient since succinctly outline the permission associated with each object and reinforces this permission the users can misuse the object in the database. Importantly, not only does the ACLs specifies which subject s (users) are granted access to the objects but also stipulates the operation to be on the objects. This restricts the users who have permission to individual objects to misuse their assigned privileges, and they can propagate rights without the consent of the administrator. Therefore, a window ACLs is worth implementing as they ensure security and management of the resources in the computer are achieved.

[1349 Words]

Scroll to Top