Creative Risks

Question 1

All aspects of a business are vital, though some have more impact on the bottom line. Permissions and access control are given based on what users need and not on what they want. This is called the policy of least privilege.

  • Mistakes happen, even when creating users. In your opinion, if a user is given more access than they need and use it to traverse to sections of the network that are not part of their job responsibilities, who is liable if trade information is stolen? Justify your answer.
  • Outline the steps you would take to ensure proper access control is being maintained and users have the correct rights. Using the Internet, look for an article on a recent breach in access control. Summarize the article, the event, and the issue that created the breach. What steps would you have taken in a similar situation?

Question 2

“Assessing Risks”

Access control starts first with assessing risks so you can properly identify potential threats and determine how to mitigate those risks.

  • Your CIO has asked you to conduct a risk assessment on a newly acquired division that works on product development and has their own servers that will be joined into the existing network. Describe the steps you would take, including the areas you would assess and the reasoning for your approach. Would you use a qualitative or quantitative approach to this assessment? Justify your reasoning.
  • Are there any external tools or websites that would be useful when conducting an assessment? Share your findings with your classmates and provide any links to any useful resources you find.

Need help with this assignment or a similar one? Place your order and leave the rest to our experts!

Quality Assured!

Always on Time

Done from Scratch.