100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Caso

CSIA 310: Cybersecurity Processes & Technologies Case Study #2: Technology & Product Review for Identity Governance & Administration

Puntuación
-
Vendido
-
Páginas
3
Subido en
16-04-2024
Escrito en
2023/2024

CSIA 310: Cybersecurity Processes & Technologies Case Study #2: Technology & Product Review for Identity Governance & Administration

Institución
Grado








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
16 de abril de 2024
Número de páginas
3
Escrito en
2023/2024
Tipo
Caso
Profesor(es)
Desconocido
Grado
Desconocido

Temas

Vista previa del contenido

CSIA 310: Cybersecurity Processes & Technologies
Case Study #2: Technology & Product Review for Identity Governance & Administration
Case Scenario:
For this case study, our focus shifts to technologies and products used to implement the Identity Governance & Administration (IGA) business process and related security controls. IGA is used to manage and mitigate insider threat. Insiders, because of their access to information and information resources (e.g. workstations, servers, networks), potentially have the opportunity and the means by which to steal intellectual property, commit fraud, and perform other types of mischief and mayhem (ranging from pranks to deliberate sabotage).
For our focus firm, Sifers-Grayson, access control and identity management have not been a serious concern ... or so their executives and managers thought. The majority of employees and managers are from the local area where there is a strong sense of community. The founders of the company belong to families who were among the original settlers for the county. They contribute heavily to local charities and youth organizations. They rely upon these connections to family and community when hiring and have a strong tradition of promoting from within.
The problem is that Sifers-Grayson's operations and sales have taken them into the vast geographies of the Internet and cyberspace. There is an emerging awareness among the engineering staff of the potential for outsiders to attack the company through its Internet connections. The thought that an insider might cause trouble for the firm is still hard for them to accept.
The company can no longer afford to depend upon social morays and norms to protect it against the possibility of insider threats. The new contracts specifically require proper labeling of information ("data classification") and require control over access to government furnished information ("GFI"). This means that the company needs to change its culture and change its management processes.
The primary means for protecting against insider threats is to control insider access to information, information systems, and the information infrastructure. The two most basic processes used to protect against insider threat are (a) identity management and (b) access controls. Data classification is also an important protective process since it enables the use of the value or sensitivity of information when determining how and when to grant access. Privilege management is a third protective process, which is used to protect against the misuse of permissive access to software applications and operating system functions. The principle of least privilege is an important control over this permissive access. Finally, separation of duties is a key business process, which is used to prevent insiders from abusing access to information and information resources. Research:
1.Review the weekly readings. 2.Choose an Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor’s website and product information brochures. Copyright ©2017 by University of Maryland University College. All Rights ReservedThis study source was downloaded by 100000883835319 from CourseHero.com on 04-16-2024 14:51:47 GMT -05:00
https://www.coursehero.com/file/25228356/CSIA-310-Case-Study-2-Identity-Governance-Administration-v2docx/
$10.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Ellisolutions Devry University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
42
Miembro desde
2 año
Número de seguidores
25
Documentos
723
Última venta
3 meses hace
Elli>solutions

.On this page you will get all documents you need in your career Excellence. (Exams,Notes,Summary,Case,Essay and many more documents). All the best in you study. Message me if you can not find the document you are looking for and i will assist you. Thanks again for purchasing my documents and Review to help others who need the best doc, Also refer others so that they can benefit from my document .All my uploaded documents Contains Latest Exam Solutions, Study Guides & I can assure an A or at least 90% if you use any of my documents

Lee mas Leer menos
4.3

4 reseñas

5
2
4
1
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes