CSIA 310
California University Of Pennsylvania
All 1 results
Sort by
-
CSIA 310: Cybersecurity Processes & Technologies Case Study #2: Technology & Product Review for Identity Governance & Administration Case Scenario:
- Case • 3 pages • 2024
-
- $9.49
- + learn more
Case Scenario: 
For this case study, our focus shifts to technologies and products used to implement the Identity 
Governance & Administration (IGA) business process and related security controls. 
IGA is used to manage and mitigate insider threat. Insiders, because of their access to information and 
information resources (e.g. workstations, servers, networks), potentially have the opportunity and the 
means by which to steal intellectual property, commit fraud, and perform other types of misch...
Get paid weekly? You can!
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia