Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

  1. Create a Word doc. In the document, briefly state the topic you selected for your search and why you selected that topic. Then, provide the EXACT web address of the forum where you registered to post. 
  2. Briefly describe the forum as well as the types of discussions/questions being asked by the other users.
  3. Take screen shots of the verification process and paste the screen shots into your document. Did it have CAPTCHA? Did it require two-factor identification? Do not proceed if you are not comfortable with sharing the information the site is asking you to provide. If this occurs, please select another topic/forum.
  4. Locate the End User License Agreement (EULA) on your selected forum and paste it in the document. This is the legal document to which you are agreeing when you join. You can read it in all cases, and in some cases you can also download it. In either case, make sure you include it with your submission.
  5. Provide a brief description of all the steps your instructor or a fellow student would need to take to sign up for the same forum you selected in order to gain the same posting rights that you have.
  6. What feedback would you give to the forum’s administrator to improve their access control strategy? If their access control strategy is exceptional, please explain why you feel this way. 

The specific course learning outcomes associated with this assignment are:

  • Diagnose risk from unauthorized access to IT systems through proper testing and reporting.
  • Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls. 

The post Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls. appeared first on Lion Essays.

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls. was first posted on February 17, 2019 at 8:17 am.
©2019 "Lion Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at support@Lion Essays.com

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now