Unit 1 Assignment 1

Satisfactory Essays
Unit 1 Assignment 1: Identification, Authentication, and Authorization Techniques

A = Assigned to the user F = Needed for primary function
T = Temporary N = Never
BP = By Position Assigned RO = Read Only
Segregation of Duties Matrix

(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
A
A
A
A
A
A
A
A
Shipping
A
A
A
A
A
A
A
A
Sales
A
A
A
A
A
A
A
A
Accounts Payable
A
A
A
A
A
A
A
A

Segregation of Duties Matrix

(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
N
N
RO
F
N
RO
T
N
Shipping
T
F
RO
RO
F
RO
T
N
Sales
F
N
RO
RO
N
RO
T
N
Accounts Payable
BP
N
RO
N
N
RO
T
N

What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
Jennifer had access to everything to the system because she’s considered as an asset to the company as well as helping the company profit, it was only right to give her as much access to the system to better the company’s profit margins. But that will give her more power to the accounts than she actually needs.
What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
With Lloyd’s account having access to everything, he’s has access to things he really doesn’t need.
What are the requirements for Buster and LuEllen?
The only real access they need is to the shipping department in order to ship out the customers’ requests.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2 Assignment 1

    • 603 Words
    • 3 Pages

    In a 1-page paper, compare the different service provide types: RBOCS, ILEC, CLEC, MSO and ISP.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    UNIT 2 ASSIGNMENT 1

    • 1061 Words
    • 5 Pages

    4. According to this chapter, which of the following concepts happens in a modern-day, end-to-end voice call between two home telephones in the United States? (Choose two answers.)…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Unit 2 Assignment 1

    • 1912 Words
    • 8 Pages

    A heat sink is an electronic device that has been designed specifically to draw heat away from the CPU and prevent it from overheating. However, the heat sink itself can become too hot sometimes. So therefore, a fan is often used to keep cool both of the CPU and the heat sink.…

    • 1912 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 2 assignment 1

    • 522 Words
    • 2 Pages

    2. How can a reader use the rhetorical situation to analyze an argument essay? How can a viewer use the rhetorical situation to analyze an image? How can a writer use the rhetorical situation during the planning phase of writing a paper?…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 356 Words
    • 2 Pages

    4. What is a discourse community? To what discourse communities do you belong? How does a discourse community help establish common ground for its members?…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    I would change the administrative passwords on all systems routinely, implement a firewall program with remote access control which will not allow, hackers entry to your company’s system.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 2 assignment

    • 15807 Words
    • 77 Pages

    In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook):…

    • 15807 Words
    • 77 Pages
    Satisfactory Essays
  • Better Essays

    Unit 3 Assignment

    • 1517 Words
    • 7 Pages

    The Africa culture is within the continent of Africa. Africa has a racial split that falls between North Africa and Sub-Saharan Africa; this divides the cultures into a significant number of ethnic cultures. African cultures are known to be diverse and varied and like the rest the world internal and external forces have impacted upon the African culture. African culture and the way of living are just as important to them as our culture and ways of living is important to us.…

    • 1517 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    unit 5 assignment1

    • 309 Words
    • 2 Pages

    What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Levis overlooked both Administrative control and Accounting control objectives. By allowing Betty to execute transactions without Management’s approval they did not satisfy Administrative controls. It is also unclear whether there was any formal official procedure established which Betty was required to follow.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    UNIT 2 Assignment 2

    • 1272 Words
    • 6 Pages

    1. Which of the following terms is the closest synonym to the term computer networking?…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and restricted will be required some sort of access mechanism to authenticate anyone who wants to access any classified documents. In order to construct a Classification policy, one must know what type of data are available, where they are located, what type of access levels are implemented and what protection level is implemented and does it adhere to compliance regulations.…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unit 2 Assignment 2

    • 1761 Words
    • 6 Pages

    1.1 Analyse the role and use of initial and diagnostic assessment in agreeing individual learner goals…

    • 1761 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Assignment

    • 308 Words
    • 2 Pages

    McMurrian, R. C., & Matulich, E. (2006). Building Customer Value and Profitability with Business Ethics. Journal of Business & Economics Research, 4 (11), 11–18.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Assignment 1

    • 352 Words
    • 2 Pages

    My name is Destiny Knott, my family and I have recently moved into a house overlooking the park in the neighborhood of Park Hall. I would like to draw your attention to some of the lewd and lascivious acts that take place daily in Park Hall. On many separate occasions up to several times a day, I have noticed from my window or front porch a crowd of undesirable individuals sitting on the benches. Numerous times these individuals have been seen drinking alcohol and carrying on very loudly, using the foulest kind of language. On another occasion my family and I have witnessed a violent fight occur right in front of the park where all of our children play. It is an outrage that our young innocent children should have to listen to and witness such inappropriate displays of behavior.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays