Deadlne in 18 hours

Deadline in 18 hours

Assignment 1

Scenario

Changing access controls can have some undesirable effects. Therefore, it is important to carefully consider changes before making them and provide mechanisms to reverse changes if they have unexpected consequences. Always Fresh management has asked you to develop procedures for changing any access controls. The purpose of these procedures is to ensure that staff:

· Understand and document the purpose of each access control change request

· Know what access controls were in place before any changes

· Get an approval of change by management

· Understand the scope of the change, both with respect to users, computers, and objects

· Have evaluated the expected impact of the change

· Know how to evaluate whether the change meets the goals

· Understand how to undo any change if necessary

Tasks

Create a guide that security personnel will use that includes procedures for implementing an access control change. The procedure guide must contain the steps Always Fresh security personnel should take to evaluate and implement an access control change. You can assume any change requests you receive are approved. Ensure that your procedures include the following:

· Status or setting prior to any change

· Reason for the change

· Change to implement

· Scope of the change

· Impact of the change

· Status or setting after the change

· Process to evaluate the change

Assignment 1 Submission Requirements

Format: Microsoft Word (or compatible)

Font: Arial, size 12, double-space

Citation Style: APA

Length: 3 to 5 pages

References: At least 4

Self-Assessment Checklist

I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

I followed the submission guidelines.

Assignment 2

Scenario 1

Microsoft Windows implements access controls by allowing organizations to define users, groups, and object DACLs that support their environment. Organizations define the rules, and Windows enables those rules to be enforced.

Answer the following question(s):

Q1. Do you think access controls are implemented differently in a government agency versus a typical information technology company? Why or why not?

Q2. Do you think access controls differ among private industries, such as retail, banking, and manufacturing? Why or why not?

Scenario 2

A human resources manager stores a spreadsheet with sensitive personal information on her local workstation. The spreadsheet is the only file with sensitive data, and the name of the spreadsheet does not change.

As a security specialist, you must choose the best form of encryption to protect the spreadsheet. Your choices are:

BitLocker

BitLocker To Go

File encryption via Encrypting File System (EFS)

Folder encryption via EFS

Answer the following question(s):

Q1. Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.

Assignment 2 Submission Requirements

Format: Microsoft Word (or compatible)

Font: Arial, size 12, double-space

Citation Style: APA

Length: 250 words for each question

References: At least 1 for each question

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"