​Physical Security Control, writing homework help

QUESTION 1.

Physical Security Control

After reading/viewing this week’s materials, please respond to one or more of the following .41

  1. What are the different Access Control Models available to secure access to resources? Give an example of one that you have used in a work situation or if that is not possible, one that you’ve read about.
  2. Identify the Access Control Categories and give an example of one that you have read about or have knowledge of from your own experience.
  3. Describe threats to the Access Control domain from what was covered within the reading and give an example of each.
  4. What are the main goals of access control and what are the best practices recommended to help in achieving them.

You must start a thread before you can read and reply to other threads

2.Information and Access Management

Actions for Information and Access Management

Must post first.

After reading/viewing this week’s materials, please respond to one or more of the following questions.

  1. What are the challenges that an Identity and Access Management system helps overcome? What benefits does it provide?
  2. In your own words describe the four main activities that comprise the System Access Control Process. What guidelines must be followed within the Identification phase?
  3. Identify the Information and Access Management Technologies and describe one that you are familiar with either from your own experience or give an example of one that you’ve read about.
  4. Describe the three factors that can be used in authentication and give at least two examples for each.

You must start a thread before you can read and reply to other threads

3.Computing Architecture and Design

Actions for Computing Architecture and Design

Must post first.

After reading/viewing this week’s materials, please respond to one or more of the following questions.

  1. Describe the difference between the Biba Integrity Model and the Clark-Wilson Integrity Model. Give an overview of the Bell LaPadula Confidentiality.
  2. In your own words, describe the concept of ring protection. What is the difference between Layering and data hiding?
  3. Define enterprise architecture and describe three benefits and three objectives of enterprise security architecture.
  4. Define the different system architecture approaches and choose one that you have personal experience with.

< a href ="/order">