Lite

profileYadullah hyder

 

There are many layers of access control in an enterprise environment.  Network protocols have access controls, applications have permissions, file systems have access control lists, etc.  These layers help distribute access control and avoid a single point of failure.  Even if one fails, the others will still be there to keep out intruders insofar as they are configured and able to do so.  Select one of these layers and prepare a response that addresses the following:

  • Describe the layer and the controls in place at this layer.  How do they work together with the controls above and below in the enterprise environment?
  • If the controls at this layer fail, what sorts of breeches, attacks, etc. would the enterprise environment be vulnerable to?  Describe a situation where a control would fail and the implications of that failure. Would the controls above and below be able to mitigate some or all of this risk?  Why or why not?

Comment on the responses of at least two classmates.  Try to offer constructive and meaningful that advances everyone’s knowledge rather than merely a virtual pat on the back or “interesting post!”

Support your response and all factual assertions with appropriate scholarly or industry sources with proper citations in APA format.  Remember that opinions are fine but they must be rooted in facts.  Do not approach this as a journal entry filled with your stream-of-thoughts.  Do thorough reading on the topic before responding and use what you’ve read as evidence to support what you post.  Do not use Wikipedia or similar sites.  Do not use blog posts unless they are official publications of the relevant companies or their employees (e.g., Mark Zuckerberg’s blog would be an appropriate source for information about Facebook).

    • Posted: 18 days ago
    • Due: 
    • Budget: $5
    Answers 1

    Purchase the answer to view it

    blurred-text