Preview

Using Roles Paper Week 3 Individual

Better Essays
Open Document
Open Document
1167 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Using Roles Paper Week 3 Individual
Using Roles Paper
This paper will discuss a better way to control user access to data is to tie data access to the role a user plays in an organization. It will cover the value of separating duties in the organization. Then discuss the value of using roles to segregate the data and system access needs of individuals in the organization. Then describe in detail why a role-based access control system (RBAC) would be the best way to accomplish this. Finally, how to handle distributed trust management issues for users going to or from business partner networks.
The value of separation of duties is an essential security standard that certifies that a specific user does not have a proficiency to misuse his or her capabilities or make substantial oversights. No user should have the influence to cause destruction acting on his or her acknowledge. The security standard is not confined to computer systems and has been in use in modern society for eras. Allocating that function into separate steps is crucial for the purpose to work, or for the command that enables that function to be neglected. Splitting the roles across multiple departments and different locations can help subsidize duty to reducing fundamental threat.
At the same time separations of duty limitations have been composed into an information system, users are looking for ways around the access authorizations because of pressure. In large organizations it is the role of the auditor to detect these intervals of control but often this is an unattainable assignment. Whenever it is difficult to segregate, other devices such as monitoring of activities, audit trails should be anticipated. It is important that security audit stays impartial.
RBAC model provides a wide scope throughout a company to control method for managing IT assets although still sustaining the most wanted level of security. Role-based permissions can be inserted and renovated quickly across multiple systems, applications and wide



References: O’Brien, J. A., & Marakas, G. M. (2011). Management information systems (10th ed.). New York, NY: McGraw-Hill. Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson. Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology/Cengage Learning.

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    This will allow access only to those doing the accounting for the company. The company also needs to have written policies. Written policies will outline rules and regulations regarding the security of information. Written policies will also explain how to keep information secure and what to do if there is a security breach. Included in the policies should be consequences of not following the rules and regulations. The company needs to have backup procedures in case the system crashes. The system should be set to back up every other day or everyday to ensure not to lose too much information. To better protect confidential information from intrusion, the company should have some firewall protection. A firewall “guards against unauthorized access to sensitive file information from external internet users. On networked systems, firewalls are often standalone devices with built-in, protective software” (Bagranoff, Simkin & Strand, 2008, pg. 39). The company should also invest in anti-spyware and anti-virus protection to protect the system from any viruses. Following the above suggestions will help minimize any threats to the company’s current system.…

    • 1170 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    CMGT430 2015 SYLLABUS

    • 2598 Words
    • 16 Pages

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks,…

    • 2598 Words
    • 16 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Polstra, R. M. (2005). A case study on how to manage the theft of information. Proceedings of the 2nd annual conference on Information security curriculum development (pp. 135-138). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    4. What is the mechanism on a Windows server where you can administer granular policies and permissions on a Windows network using role-based access?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    2. Given a scenereo where there are 5 database admins that may periodically need access to a given system. Discuss a better concept to better manage the admins access permissions.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below. Which types of logical access controls should be used in each scenario? Justify your recommendations.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Steve Hawkins David C. Yen David C. Chou, (2000),"Awareness and challenges of Internet security", Information…

    • 9738 Words
    • 54 Pages
    Powerful Essays
  • Powerful Essays

    Benantar Messaoud :[2010] Access Control System : Security Identity Management and Trust Model [1st Edition ]New York LLC – Verlag…

    • 2080 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Smart Card Access Control

    • 3570 Words
    • 15 Pages

    In this assignment, the newest established bank has employed me as one of their colleague to be the Project Manager of IT Department of Yale Bank. As the Yale Bank has been growing commercially, they need to address the increasing number of employees by automating the access control of each department to protect their company’s interest. Only selected number of employees that has the valid credentials can enter or have access to a certain offices and electronic files that can be accessed through various system tools.…

    • 3570 Words
    • 15 Pages
    Powerful Essays