Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Isol 531

22/12/2020 Client: saad24vbs Deadline: 24 Hours

University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 1


Course Summary


Course Number and Name ISOL 531 – Access Control


Course Term and Delivery 2019 Spring – IG


Asynchronous Online Course


Course Instructor Dr. Dennis Backherms


Email: dennis.backherms@ucumberlands.edu


Office Hours: By appointment


Course Description The course provides an in-depth study of the three main security principles: availability, integrity and


confidentiality. The course examines mechanisms used to control what resources an entity can access,


and the extent of the entity’s capabilities to interact with the resource. The course also examines


approaches to auditing how the entity interacts with the resource.


Course Objectives 1. Define the authorization and the access to an IT infrastructure based on an access control policy


framework.


2. Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access


controls.


3. Analyze how a data classification standard impacts an IT infrastructure’s access control


requirements and implementation.


4. Develop an access control policy framework consisting of best practices for policies, standards,


procedures, and guidelines to mitigate unauthorized access.


5. Assess the consequences of failed access controls and mitigate unauthorized access.


6. Apply various access control methods to solve a range of business challenges.


7. Define proper security controls for information systems within IT infrastructures.


8. Explore ways to secure the facilities that house sensitive resources and use biometric technology


to verify identity.


mailto:dennis.backherms@ucumberlands.edu

University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 2


9. Design appropriate authentication solutions throughout an IT infrastructure based on user types


and data classification standards.


10. Utilize policies, standards, guidelines, and procedures to implement and maintain access control.


11. Implement a secure remote access solution.


Course Structure • Watch weekly lecture • Participate in class discussion via forums • Reading assigned texts • Complete quizzes based on labs • Complete homework assignments


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 3


Learning Materials and References


Required Resources


Textbook(s) Required:


 Chapple, Mike, Ballad, Bill, Ballad, Tricia, and Banks, Erin K. Access Control, Authentication, and Public Key Infrastructure, Second Edition. Jones & Bartlett Learning, 2014.


Recommended Materials/Resources


Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for


supplementary information to augment your learning in this subject.


 Official (ISC)2 Training Guide CISSP CBK, 2015  Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.  Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition.


McGraw-Hill, 2013.


Professional Associations


 International Association of Privacy Professionals (IAPP)


This Web site provides opportunity to interact with a community of privacy professionals and to


learn from their experiences. This Web site also provides valuable career advice.


https://www.privacyassociation.org/


 International Information Systems Security Certification Consortium, Inc., (ISC)²®


This Web site provides access to current industry information. It also provides opportunities in


networking and contains valuable career tools.


http://www.isc2.org/


 ISACA


This Web site provides access to original research, practical education, career-enhancing


certification, industry-leading standards, and best practices. It also provides a network of like-


minded colleagues and contains professional resources and technical/managerial publications.


https://www.isaca.org/Pages/default.aspx


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 4


Course Outline


Note: Assignments in the following table are listed when they are due.


Grading Category Activity Title


Week 1: Assessing Risk and the Access Control Framework


Required Readings  Chapter 1, “Access Control Framework”  Chapter 2, “Assessing Risk and Its Impact on Access Control”


Discussion Introduction


Lab #1 Configuring an Active Directory Domain Controller


Lab #1 Quiz


Lab #2 Managing Windows Accounts and Organizational Units


Lab #2 Quiz


Week 2: Business Access Control Needs and Requirements


Required Readings  Chapter 3, “Business Drivers for Access Controls”  Chapter 4, “Access Control Policies, Standards, Procedures,


and Guidelines”


Discussion Privacy and Compliance


Lab #3 Configuring Windows File System Permissions


Lab #3 Quiz


Assignment Identification, Authentication, and Authorization Techniques


Week 3: Security Breaches and Business Challenges


Required Readings  Chapter 5, “Security Breaches and the Law”  Chapter 6, “Mapping Business Challenges to Access Control


Types”


Discussion Security Breach Evaluation


Lab #4 Managing Group Policy Objects in Active Directory


Lab #4 Quiz


Lab #5 Configuring Windows Firewall


Lab #5 Quiz


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 5


Grading Category Activity Title


Week 4: Humans and Access Control


Required Readings


 Chapter 7, “Human Nature and Organizational Behavior”  Chapter 8, “Access Control for Information Systems”


Discussion Mapping Business Challenges to Types of Control


Exam Midterm Exam


Week 5: Physical Security and Access Control


Required Readings  Chapter 9, “Physical Security and Access Control”  Chapter 10, “Access Control in the Enterprise”


Discussion Biometric System Evaluation


Lab #6 Managing Linux Accounts


Lab #6 Quiz


Assignment Implementation of Authentication Process


Week 6: Remote Workers and Access Control


Required Readings  Chapter 11, “Access Control System Implementations”  Chapter 12, “Access Control Solutions for Remote Workers”


Discussion Multilayer User Access Control


Assignment Internet/Web Access Management


Week 7: Public Key Infrastructure and Access Control


Required Readings  Chapter 13, “Public Key Infrastructure and Encryption”  Chapter 14, “Testing Access Control Systems”


Discussion Remote Access Method Evaluation


Assignment PKI and Encryption at Work


Week 8: Your Academic Journey Continues…


Discussion Personal Reflection


Assignment Executive Program Practical Connection


Exam Final Exam


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 6


Evaluation and Grading Evaluation Criteria The graded assignments will be evaluated using the following weighted categories:


Category Weight


• Discussions • 20 • Labs • 20 • Assignments • 20 • Midterm Exam • 20 • Final Exam • 20


• TOTAL • 100%


Grade Conversion The final grades will be calculated from the percentages earned in the course, as follows:


Grade Percentage


A 90–100% B 80–89.5% C 70–79.5% F <69.5%


Course Expectations


Academic Integrity At a Christian liberal arts University committed to the pursuit of truth and understanding, any act of


academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty


involves the abuse and misuse of information or people to gain an undeserved academic advantage or


evaluation. The common forms of academic dishonesty include:


a. cheating - using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities


b. lying—falsifying, fabricating, or forging information in either written, spoken, or video presentations


c. plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 7


Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The


potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing


grade for the entire course, or charges against the student with the appropriate disciplinary body.


Late Policy Students are expected to submit classroom assignments by the posted due date and to complete the


course according to the published class schedule. As adults, students, and working professionals I


understand you must manage competing demands on your time. Late assignments will not be accepted for a grade; no exceptions. Absolutely NO assignments will be accepted after the last day of the course.


Students with Disabilities University of the Cumberlands accepts students with certified disabilities and provides reasonable


accommodations for their certified needs in the online classroom or in other areas. For accommodations


to be awarded, a student must submit a completed Accommodations Application form and provide


documentation of the disability. Students who may have a disability meriting an academic


accommodation should contact the Disability Services Coordinator (Nate Clouse, in Boswell Campus


Center) to ensure that their needs are properly evaluated and that documentation is on file. Any


accommodations for disabilities must be re-certified each bi-term by the Disability Services Coordinator


before course adjustments are made by individual instructors.


Student Responsibilities 1. Students are expected to login several times per week to participate in class discussions. 2. Students are expected to find out if any changes have been made in the class or


assignment schedule. 3. Students are expected to be self-motivating in an online, asynchronous course.


Course Summary

Course Number and Name

Course Term and Delivery

Course Instructor

Course Description

Course Objectives

Course Structure

Learning Materials and References

Required Resources

Recommended Materials/Resources

Course Outline

Evaluation Criteria

Grade Conversion

Course Expectations

Academic Integrity

Late Policy

Students with Disabilities

Student Responsibilities

Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
University Coursework Help
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$140 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$142 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Friday night lights football quotes - Employee training and development raymond noe 6th edition - Goldman sachs veterans internship program - Clark rubber foam blocks - Girl by jamaica kincaid prezi analysis - Social engineering amazon refund - Good night and good luck scene analysis - Edmund emil kemper ii - No frills money skills episode 2 ways to save answers - Master of counselling uc - Kesava theertha swamiji ashram - Glst meaning - St matthew from the gospel book of charlemagne - How can policies and procedures facilitate good strategy execution - Multi symptom black star liner lyrics - W4 - Technology Crisis Communication - The two primary issues to consider in organizational feasibility analysis are ________. - 2 a3 paper size - Gm 5.7 lg sgi 638 - Chapters 28 31 to kill a mockingbird - Parchment fill effect microsoft word 2016 - Gcu emergency/active shooter - Strategy and hrm at delta airlines - As 2293.1 free download - CIS 275 - Icas test of competence - Stopping waste is a vital part of lean - Curriculum vitae computer science - Harmonic analysis in matlab - Wk 1 - Integrated Marketing Concepts Applications Paper - Microsoft Excel Assignment 2 - 4 3 loan calculations and regression worksheet answers - En 10204 type 2.2 pdf - Adobe lightroom serial number location - Why is it unlikely that you will find the ip address 192.168.250.10 on the internet? - Right boss wrong company case study answers - Past tense of teach - Chapter 18 study guide consumer credit - Week5 Community Nurse - The wedding photographer book pdf - Knight engines excalibur engine parts - Smart goal powerpoint for students - Daily - Critical Thinking About HRM - Paper review - In a denial of service ddos attack the perpetrator ____ - Complex to phasor calculator - Change the voice sentences with answers - 1 kilo to grams - Bulbs by cecil taylor - Data-driven decision making - Final Exam 321 - Determine the centroid x y of the shaded area - Servlet life cycle ppt - Arb classic canopy internal support - Psychology - Victoria school of languages - Who wrote gulliver's travels - Las posadas traditional songs - Density of water in g mm3 - Chem Lab, Introduction to molecules - Brisbane city council small lot code - What are the abcd's of nutritional assessment - The dominant area of study for the neobehaviorists was - Living word early learning center vandalia oh - Ayres sensory integration training australia - The ______ states that two species cannot coexist indefinitely in the same niche. - Arduino mega vin pin - Office redir microsoft rlid office help - What are mutts in hunger games - Security architecture - Strong interest inventory review - How to calculate altman z score in excel - Cantabile in music terms - CHRISTIAN SERVANT LEADERS - Target market for portable chargers - Film critique - Delta airlines powerpoint - Nursing Project - St chads court birmingham - Bambang trihatmodjo net worth - Tertia optica area - CLA 2 PPT - Presentation for the Business Research Proposal - Part three problem sets problem set a answers - Interview homework - Secrets of house music production book pdf - Cheerleading moves for flyers - Create a scenario summary report excel 2013 - Give me liberty 6th edition volume 2 pdf - Stat trek binomial - 4mat review - Describe conduction convection and radiation - Tuesday siesta short story - Stareway to spelling programme - Why do businesses exist - Iep goals for prefixes and suffixes - African American History Journal - Daddy long legs musical bootleg - Child development theories chart - Types of channel integration