Ch 6 Access Controls Literature Review
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
Ch 6 Access Controls Literature Review
Assessment Instructions:
Read the embedded .pdf and provide a 1-2-page assessment of the case study. In your assessment, be sure to correctly identify the problem statement being hypothesized along with the concluding recommendation from the authors.
Ch 6 Access Controls Literature Review
Throughout the first few pages in Chapter 6, you read about all different types of access controls. You read about role-based, attribute-based, and so on (refer to the chart on page 326-327 in the textbook).
Access controls are extremely important for any organization. By properly implementing access controls, you as a security expert can save the network from being attacked both by an insider and of course from an outsider.
Assessment Instructions:
For this assessment, you are to find a scholarly article on one of the access control methods you read about, preferably about the one that intrigues you the most. Use the CWU Library or Google Scholar to find the article. I want you to conduct a short literature review of the article. In this review, be sure to include the problem statement and what the conclusion was from the article. Your opinions matter in this review.
The literature review should be no more than 5 pages long.
Chapter 7
Throughout the chapter, you learned about IDS, IDPS, scanning and analysis tools, honeypots and honeynets, and so forth. All are very important to understand and implement when at all possible.
Assessment Instructions:
For this assessment, please refer to page 445 in the textbook. You are to answer questions #4 and #5.
For each answer, you should have at least 2-3 paragraphs with your answer. Ensure you provide the reference for your answer using APA style format.
Provide the question and the answer together for ease of reading and grading.