Outline how your team will approach the implementation phase of the access control strategy.Describe administrative strategies related to the creation and deletion of new accounts.Use at least three quality resources in this assignment.Note:Wikipedia and similar websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment,the student’s name, the professor’s name, the course title, andthe date.The specific course learning outcomes associated with this assignment are:
Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls. Determine appropriate access controls for information systems within IT infrastructures. Diagnose risk from unauthorized access to IT systems through proper testing and reporting. Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills, using the following rubric .
You've reached the end of your free preview.
Want to read all 4 pages?
- Spring '19
- Tom Pope