Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Isol 531

22/12/2020 Client: saad24vbs Deadline: 3 days

University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 1


Course Summary


Course Number and Name ISOL 531 – Access Control


Course Term and Delivery 2019 Spring – IG


Asynchronous Online Course


Course Instructor Dr. Dennis Backherms


Email: dennis.backherms@ucumberlands.edu


Office Hours: By appointment


Course Description The course provides an in-depth study of the three main security principles: availability, integrity and


confidentiality. The course examines mechanisms used to control what resources an entity can access,


and the extent of the entity’s capabilities to interact with the resource. The course also examines


approaches to auditing how the entity interacts with the resource.


Course Objectives 1. Define the authorization and the access to an IT infrastructure based on an access control policy


framework.


2. Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access


controls.


3. Analyze how a data classification standard impacts an IT infrastructure’s access control


requirements and implementation.


4. Develop an access control policy framework consisting of best practices for policies, standards,


procedures, and guidelines to mitigate unauthorized access.


5. Assess the consequences of failed access controls and mitigate unauthorized access.


6. Apply various access control methods to solve a range of business challenges.


7. Define proper security controls for information systems within IT infrastructures.


8. Explore ways to secure the facilities that house sensitive resources and use biometric technology


to verify identity.


mailto:dennis.backherms@ucumberlands.edu

University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 2


9. Design appropriate authentication solutions throughout an IT infrastructure based on user types


and data classification standards.


10. Utilize policies, standards, guidelines, and procedures to implement and maintain access control.


11. Implement a secure remote access solution.


Course Structure • Watch weekly lecture • Participate in class discussion via forums • Reading assigned texts • Complete quizzes based on labs • Complete homework assignments


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 3


Learning Materials and References


Required Resources


Textbook(s) Required:


 Chapple, Mike, Ballad, Bill, Ballad, Tricia, and Banks, Erin K. Access Control, Authentication, and Public Key Infrastructure, Second Edition. Jones & Bartlett Learning, 2014.


Recommended Materials/Resources


Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for


supplementary information to augment your learning in this subject.


 Official (ISC)2 Training Guide CISSP CBK, 2015  Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.  Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition.


McGraw-Hill, 2013.


Professional Associations


 International Association of Privacy Professionals (IAPP)


This Web site provides opportunity to interact with a community of privacy professionals and to


learn from their experiences. This Web site also provides valuable career advice.


https://www.privacyassociation.org/


 International Information Systems Security Certification Consortium, Inc., (ISC)²®


This Web site provides access to current industry information. It also provides opportunities in


networking and contains valuable career tools.


http://www.isc2.org/


 ISACA


This Web site provides access to original research, practical education, career-enhancing


certification, industry-leading standards, and best practices. It also provides a network of like-


minded colleagues and contains professional resources and technical/managerial publications.


https://www.isaca.org/Pages/default.aspx


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 4


Course Outline


Note: Assignments in the following table are listed when they are due.


Grading Category Activity Title


Week 1: Assessing Risk and the Access Control Framework


Required Readings  Chapter 1, “Access Control Framework”  Chapter 2, “Assessing Risk and Its Impact on Access Control”


Discussion Introduction


Lab #1 Configuring an Active Directory Domain Controller


Lab #1 Quiz


Lab #2 Managing Windows Accounts and Organizational Units


Lab #2 Quiz


Week 2: Business Access Control Needs and Requirements


Required Readings  Chapter 3, “Business Drivers for Access Controls”  Chapter 4, “Access Control Policies, Standards, Procedures,


and Guidelines”


Discussion Privacy and Compliance


Lab #3 Configuring Windows File System Permissions


Lab #3 Quiz


Assignment Identification, Authentication, and Authorization Techniques


Week 3: Security Breaches and Business Challenges


Required Readings  Chapter 5, “Security Breaches and the Law”  Chapter 6, “Mapping Business Challenges to Access Control


Types”


Discussion Security Breach Evaluation


Lab #4 Managing Group Policy Objects in Active Directory


Lab #4 Quiz


Lab #5 Configuring Windows Firewall


Lab #5 Quiz


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 5


Grading Category Activity Title


Week 4: Humans and Access Control


Required Readings


 Chapter 7, “Human Nature and Organizational Behavior”  Chapter 8, “Access Control for Information Systems”


Discussion Mapping Business Challenges to Types of Control


Exam Midterm Exam


Week 5: Physical Security and Access Control


Required Readings  Chapter 9, “Physical Security and Access Control”  Chapter 10, “Access Control in the Enterprise”


Discussion Biometric System Evaluation


Lab #6 Managing Linux Accounts


Lab #6 Quiz


Assignment Implementation of Authentication Process


Week 6: Remote Workers and Access Control


Required Readings  Chapter 11, “Access Control System Implementations”  Chapter 12, “Access Control Solutions for Remote Workers”


Discussion Multilayer User Access Control


Assignment Internet/Web Access Management


Week 7: Public Key Infrastructure and Access Control


Required Readings  Chapter 13, “Public Key Infrastructure and Encryption”  Chapter 14, “Testing Access Control Systems”


Discussion Remote Access Method Evaluation


Assignment PKI and Encryption at Work


Week 8: Your Academic Journey Continues…


Discussion Personal Reflection


Assignment Executive Program Practical Connection


Exam Final Exam


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 6


Evaluation and Grading Evaluation Criteria The graded assignments will be evaluated using the following weighted categories:


Category Weight


• Discussions • 20 • Labs • 20 • Assignments • 20 • Midterm Exam • 20 • Final Exam • 20


• TOTAL • 100%


Grade Conversion The final grades will be calculated from the percentages earned in the course, as follows:


Grade Percentage


A 90–100% B 80–89.5% C 70–79.5% F <69.5%


Course Expectations


Academic Integrity At a Christian liberal arts University committed to the pursuit of truth and understanding, any act of


academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty


involves the abuse and misuse of information or people to gain an undeserved academic advantage or


evaluation. The common forms of academic dishonesty include:


a. cheating - using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities


b. lying—falsifying, fabricating, or forging information in either written, spoken, or video presentations


c. plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 7


Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The


potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing


grade for the entire course, or charges against the student with the appropriate disciplinary body.


Late Policy Students are expected to submit classroom assignments by the posted due date and to complete the


course according to the published class schedule. As adults, students, and working professionals I


understand you must manage competing demands on your time. Late assignments will not be accepted for a grade; no exceptions. Absolutely NO assignments will be accepted after the last day of the course.


Students with Disabilities University of the Cumberlands accepts students with certified disabilities and provides reasonable


accommodations for their certified needs in the online classroom or in other areas. For accommodations


to be awarded, a student must submit a completed Accommodations Application form and provide


documentation of the disability. Students who may have a disability meriting an academic


accommodation should contact the Disability Services Coordinator (Nate Clouse, in Boswell Campus


Center) to ensure that their needs are properly evaluated and that documentation is on file. Any


accommodations for disabilities must be re-certified each bi-term by the Disability Services Coordinator


before course adjustments are made by individual instructors.


Student Responsibilities 1. Students are expected to login several times per week to participate in class discussions. 2. Students are expected to find out if any changes have been made in the class or


assignment schedule. 3. Students are expected to be self-motivating in an online, asynchronous course.


Course Summary

Course Number and Name

Course Term and Delivery

Course Instructor

Course Description

Course Objectives

Course Structure

Learning Materials and References

Required Resources

Recommended Materials/Resources

Course Outline

Evaluation Criteria

Grade Conversion

Course Expectations

Academic Integrity

Late Policy

Students with Disabilities

Student Responsibilities

Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Calculation Guru
Helping Hand
University Coursework Help
Writer Writer Name Offer Chat
Calculation Guru

ONLINE

Calculation Guru

I see that your standard of work is to get content for articles. Well, you are in the right place because I am a professional content writer holding a PhD. in English, as well as having immense experience in writing articles for a vast variety of niches and category such as newest trends, health issues, entertainment, technology, etc and I will make sure your article has all the key pointers and relevant information, Pros, Cons and basically all the information that a perfect article needs with good research. Your article is guaranteed to be appealing, attractive, engaging, original and passed through Copyscape for the audience so once they start reading they keep asking for more and stay interested.

$225 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$230 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$232 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Paulson company issues 6 four year bonds - Montana 1948 text response essay - Ndt resource center sound - Is provider sponsored organization a gatekeeper - Johnson and johnson investor presentation - University of ottawa political science - Legacy of the progressive era - Cengage diet and wellness plus login - Apple cider vinegar for trichomoniasis - Waren sports supply bank reconciliation - Cisco ws g5486 datasheet - Stella mccartney marketing mix - Boom and bust in telecommunications case study answers - Zimbio star trek quiz - Methods of collecting job analysis - Health Insurance Project - Career Planning and Management - Labview signal processing tutorial - Paper tower challenge one sheet - Http biz yahoo com ic ind_index html - When they came for me holocaust poem - Cells worksheet year 7 - Making aspirin from willow bark - What is a good percent yield - Kennards hire trinity gardens - Flashback a brief history of film 5th edition pdf - Ib design technology syllabus - Best Love Vashiakran Specialist Baba Ji+91-9924492424 - Usa 1919 41 revision notes - 1.4 kg in grams - Patterns in the periodic table - A doll's house marriage - Panasonic corporation annual report - Theory in practice the case of stan dvd download - Qut 24 hour library - Unit II Assignment - I need 3 Answer of the 3 questions what the nature of this stigma is 2) why the stigma is an important issue 3) The stigma facing non-heterosexuals in a heteronormative society is a major factor influencing approaches to both sexual activity and sexual health and treatment - Most scientists who use dna microarrays obtain them - Planning process of coca cola company - Help 1 - Fundamentals of probability with stochastic processes - As nzs 4777.1 free download - Multiplying decimals by 10 100 and 1000 - The tires of a car make revolutions - Alcoa foundation grant application - A large firm uses an average of boxes - Nodes and antinodes formula - Health Care week 9 - English writing - Exercise 5 - Impaired physical mobility short and long term goal - Factor analysis in python example - Tcp ip attack lab solution - Effective Speaking Discussion - Data table 1: redox reaction of copper and silver nitrate - The Importance of Relationships - Mr megabucks dna worksheet answer key - Ubc 1997 building code volume 2 - Natural selection bunny simulation - Battle dress kenning in beowulf - Bluefruit ez key keyboard - ARTIFICIAL INTELLIGENCE - How to determine critical path in pert chart - Conscience of the aviation maintainer creed - Art made out of recycled materials - Absent from school email - Romeo and juliet act 4 scene 2 questions and answers - Canter and canter limit setting definition - Stanley kubrick chess rating - Chocolate lovers unite a role playing simulation on web analytics - Program to find product of first n natural numbers - Proposal for Government - What is cp chemistry - The Art of Interviewing - submission after one hour - Consolidation of less than wholly owned subsidiaries solutions - University of the cumberlands mat option 6 - Gcu wellness center - The caux principles for ethical international business - Morrisons swan valley 3 address - Adolescent adult sensory profile - Data science life cycle pdf - French alphabet song rap - Long term capital management case study - How to add editors on weebly - Psychology Discussion SUPER EASY AND FAST PLZ HELP - What is technical competence in film - Brain training for dogs pdf - Describe juliet's rapidly changing attitudes toward romeo in this scene - Powerdown shock cross reference - 202 stanhill drive chevron island - Describe how outsourcing can be used for risk transference - Dulux paint over powder coating - Lucy and metty dental care - Sinéad o connor spouse - Advantages and disadvantages of parenteral administration - Nucleophilic substitution mechanism animation - Questions - Can you mix different solar panels - Minnesota model of treatment - 2 tim 3 16 nasb - 1500 ml fluid restriction breakdown