Enterprise Access Controls”
The higher the risk of an attacker entering an organization and compromising information, the more constraints the enterprise should place on their users.
- Suppose that your place of employment uses three (3) separate login methods to access different resources on the network. Assess how a Single Sign On (SSO) within an Active Directory Domain would be the best solution to this issue. Explain how Kerberos fits into the design and the mechanism used to provide security. Would there be any downsides to these methods? Justify your answer.
Additional post option: Discuss the concept of least privilege and how you would determine the rights of users.
Many of the men who contributed to the birth of our new nation had great plans for schools and other educational institutions. For many reasons, very few of their plans actually materialized. Select two plans (such as the defeat of Jefferson’s “Bill for the More General Diffusion of Knowledge,” or the unwillingness of the wealthy landowners to pay property taxes for the education of the poor) and explain why you believe these plans did not come to fruition. You must support your opinion with examples from the text and one additional source. Cite your sources in APA format.
In addition, answer the following questions:
- Have we learned from the obstacles that our founding fathers faced?
- Do you see similarities between the obstacles our founding fathers faced and what we deal with today? Why, or why not?