Access control project | Information Systems homework help

I need 10 pages of report and 10 slides 

Purpose

This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:

  • The ability to discern when a risk assessment should be performed and carrying out the task
  • Understanding user or customer access requirements, whether remote or local
  • Using a layered security approach to establish and maintain access controls
  • Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel

Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course.

Required Source Information and Tools

The following tools and resources will be needed to complete this project:

  • Course textbook
  • Access to the Internet
  • Access to the library
  • Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)

Learning Objectives and Outcomes

Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following:

  • Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance.
  • Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
  • Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation.
  • Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
  • Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior.
  • Implement appropriate access controls for information systems within IT infrastructures.
  • Mitigate risks from unauthorized access to IT systems through proper testing and reporting.

Project Checkpoints

The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presentation.

Checkpoint

Purpose of the Checkpoint

Expected Deliverables

1

  • Understanding requirements
  • Clarification on project deliverables
  • Discussion on project concerns and progress up to  this checkpoint
  • A review of the course project’s outline and schedule for completion

Prepare an initial outline of issues and potential solutions and discuss with your instructor, the chief information officer (CIO).

2

  • Clarification on project deliverables
  • Discussion on project concerns and progress up to this checkpoint
  • A review of the course project’s outline and schedule for completion

Prepare an extended outline of issues and potential solutions and discuss with your instructor, the CIO.

3

  • Clarification on project deliverables
  • Discussion on project concerns and progress up to this checkpoint
  • A review of the course project’s outline and schedule for completion

Draft the report and the PowerPoint presentation to discuss with your instructor, the CIO.

4

  • Clarification on project deliverables
  • Discussion on project concerns and progress up to this checkpoint
  • A review of the course project’s outline and schedule for completion

Modify the report and the PowerPoint presentation based on feedback from your instructor, the CIO.

Deliverables

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

  • Develop solutions to the issues that the specified location of IDI is facing.
  • Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.
  • Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.
  • Analyze the strengths and weaknesses in the current systems of IDI.
  • Address remote user and Web site user’s secure access requirements.
  • Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.
  • Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.
  • Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.
  • Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location.

Self-Assessment Checklist

  • I have considered an access control policy framework to define authorization and access to an IT infrastructure for compliance within the course project.
  • I have considered the influence of the data classification standard in an IT infrastructure’s access control requirements and implementation.
  • I have defined proper security controls within the User Domain to mitigate risk and threats caused by human nature and behavior.
  • I have developed and implemented an effective plan to mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
  • I have developed an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
  • I have implemented appropriate access controls for information systems within IT infrastructures.
  • I have followed the submission requirements and necessary details for writing the report.
Study Locus
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.