100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Case

CSIA 310: Cybersecurity Processes & Technologies Case Study #2: Technology & Product Review for Identity Governance & Administration

Rating
-
Sold
-
Pages
3
Uploaded on
16-04-2024
Written in
2023/2024

CSIA 310: Cybersecurity Processes & Technologies Case Study #2: Technology & Product Review for Identity Governance & Administration









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
April 16, 2024
Number of pages
3
Written in
2023/2024
Type
Case
Professor(s)
Unknown
Grade
Unknown

Subjects

Content preview

CSIA 310: Cybersecurity Processes & Technologies
Case Study #2: Technology & Product Review for Identity Governance & Administration
Case Scenario:
For this case study, our focus shifts to technologies and products used to implement the Identity Governance & Administration (IGA) business process and related security controls. IGA is used to manage and mitigate insider threat. Insiders, because of their access to information and information resources (e.g. workstations, servers, networks), potentially have the opportunity and the means by which to steal intellectual property, commit fraud, and perform other types of mischief and mayhem (ranging from pranks to deliberate sabotage).
For our focus firm, Sifers-Grayson, access control and identity management have not been a serious concern ... or so their executives and managers thought. The majority of employees and managers are from the local area where there is a strong sense of community. The founders of the company belong to families who were among the original settlers for the county. They contribute heavily to local charities and youth organizations. They rely upon these connections to family and community when hiring and have a strong tradition of promoting from within.
The problem is that Sifers-Grayson's operations and sales have taken them into the vast geographies of the Internet and cyberspace. There is an emerging awareness among the engineering staff of the potential for outsiders to attack the company through its Internet connections. The thought that an insider might cause trouble for the firm is still hard for them to accept.
The company can no longer afford to depend upon social morays and norms to protect it against the possibility of insider threats. The new contracts specifically require proper labeling of information ("data classification") and require control over access to government furnished information ("GFI"). This means that the company needs to change its culture and change its management processes.
The primary means for protecting against insider threats is to control insider access to information, information systems, and the information infrastructure. The two most basic processes used to protect against insider threat are (a) identity management and (b) access controls. Data classification is also an important protective process since it enables the use of the value or sensitivity of information when determining how and when to grant access. Privilege management is a third protective process, which is used to protect against the misuse of permissive access to software applications and operating system functions. The principle of least privilege is an important control over this permissive access. Finally, separation of duties is a key business process, which is used to prevent insiders from abusing access to information and information resources. Research:
1.Review the weekly readings. 2.Choose an Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor’s website and product information brochures. Copyright ©2017 by University of Maryland University College. All Rights ReservedThis study source was downloaded by 100000883835319 from CourseHero.com on 04-16-2024 14:51:47 GMT -05:00
https://www.coursehero.com/file/25228356/CSIA-310-Case-Study-2-Identity-Governance-Administration-v2docx/

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ellisolutions Devry University
View profile
Follow You need to be logged in order to follow users or courses
Sold
42
Member since
2 year
Number of followers
25
Documents
723
Last sold
3 months ago
Elli>solutions

.On this page you will get all documents you need in your career Excellence. (Exams,Notes,Summary,Case,Essay and many more documents). All the best in you study. Message me if you can not find the document you are looking for and i will assist you. Thanks again for purchasing my documents and Review to help others who need the best doc, Also refer others so that they can benefit from my document .All my uploaded documents Contains Latest Exam Solutions, Study Guides & I can assure an A or at least 90% if you use any of my documents

Read more Read less
4.3

4 reviews

5
2
4
1
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions