• help@unquite.com
  • +1 302 231 1203

QUESTION'S DESCRIPTION

$ 140
CIS 560 Week 1 and 2 Complete Work

Question Posted By

Online
  • danny
  • Questions : 2332
  • Solutions : 238

Question Description

CIS 560 Week 1 and 2 Complete Work

Week 1   Discussion –- (1 page)

"Acceptable Use Policy and Access Control"  Please respond to the following IN YOUR OWN WORDS:

Organizations should have policies that describe which users have access to sensitive systems and data, for what purpose, and for how long. Assume that you are an IT manager in charge of creating your organization’s new Acceptable Use Policy. What are the most important items to add to that policy in order to help enforce access control? Explain your answer.

Week 1: Case Study 1: Stuxnet

In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) systems. It was reported that the worm appeared to target Iran’s uranium enrichment infrastructure. Most computer worms and viruses tend to target consumer systems such as desktop computers and laptop computers.

You can learn more about Stuxnet at http://www.youtube.com/watch?v=scNkLWV7jSw.

Write a four to five (4-5) page paper in which you:

  1. Analyze the level of security requirements between industrial systems and consumer devices such as desktop computers. Address if they should be the same or different.
  2. Analyze the anatomy of Stuxnet and how it was able to damage Iran’s SCADA systems.
  3. Evaluate the lessons that were learned from Stuxnet about the vulnerability of Iran’s SCADA systems. Suggest how the attacks could have been prevented.
  4. Provide five (5) guidelines that should be used to reduce a network’s attack surface for industrial control systems.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Week 2 : Discussion – 1 Page

Access Control in Business.   Please respond to the following in YOUR OWN WORDS:

1.     Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.

2.     The 3 access control strategies include DAC, MAC, and RBAC.  Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.

Week 2 : Assignment 1: Access Restrictions

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment. 

Write a four to five (4-5) page paper in which you:

  1. Identify the business you have selected.
  2. Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access.
  3. Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access.
  4. Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access.
  5. Determine the type of access levels you would provide to a contractor or consultant.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 


Available Solutions
$ 140
CIS 560 Week 1 and 2 Complete Work

Answer Posted By

online
  • danny
  • Questions : 2332
  • Solutions : 238
Solution Description

xxxxxxxxxxxxxx 560 xxxx 1 xxx 2 xxxxxxxx Work

 

Buy Solution !
JOIN OUR NEWLETTER

Be the first to receive exciting news,features and special offers from Minds Blow

Copyrights © 2016 | Unquite.com is a Part of Minds Blow LLC and All Rights Reserved With Minds Blow LLC

Uploading copyrighted material is strictly prohibited. Refer to our DMCA Policy for more information.

This is an online marketplace for tutorials and study guides. All the content is provided by third parties and unquite.com is not liable for the similarity.