Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Isol 531

22/12/2020 Client: saad24vbs Deadline: 3 days

University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 1


Course Summary


Course Number and Name ISOL 531 – Access Control


Course Term and Delivery 2019 Spring – IG


Asynchronous Online Course


Course Instructor Dr. Dennis Backherms


Email: dennis.backherms@ucumberlands.edu


Office Hours: By appointment


Course Description The course provides an in-depth study of the three main security principles: availability, integrity and


confidentiality. The course examines mechanisms used to control what resources an entity can access,


and the extent of the entity’s capabilities to interact with the resource. The course also examines


approaches to auditing how the entity interacts with the resource.


Course Objectives 1. Define the authorization and the access to an IT infrastructure based on an access control policy


framework.


2. Mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access


controls.


3. Analyze how a data classification standard impacts an IT infrastructure’s access control


requirements and implementation.


4. Develop an access control policy framework consisting of best practices for policies, standards,


procedures, and guidelines to mitigate unauthorized access.


5. Assess the consequences of failed access controls and mitigate unauthorized access.


6. Apply various access control methods to solve a range of business challenges.


7. Define proper security controls for information systems within IT infrastructures.


8. Explore ways to secure the facilities that house sensitive resources and use biometric technology


to verify identity.


mailto:dennis.backherms@ucumberlands.edu

University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 2


9. Design appropriate authentication solutions throughout an IT infrastructure based on user types


and data classification standards.


10. Utilize policies, standards, guidelines, and procedures to implement and maintain access control.


11. Implement a secure remote access solution.


Course Structure • Watch weekly lecture • Participate in class discussion via forums • Reading assigned texts • Complete quizzes based on labs • Complete homework assignments


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 3


Learning Materials and References


Required Resources


Textbook(s) Required:


 Chapple, Mike, Ballad, Bill, Ballad, Tricia, and Banks, Erin K. Access Control, Authentication, and Public Key Infrastructure, Second Edition. Jones & Bartlett Learning, 2014.


Recommended Materials/Resources


Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for


supplementary information to augment your learning in this subject.


 Official (ISC)2 Training Guide CISSP CBK, 2015  Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.  Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition.


McGraw-Hill, 2013.


Professional Associations


 International Association of Privacy Professionals (IAPP)


This Web site provides opportunity to interact with a community of privacy professionals and to


learn from their experiences. This Web site also provides valuable career advice.


https://www.privacyassociation.org/


 International Information Systems Security Certification Consortium, Inc., (ISC)²®


This Web site provides access to current industry information. It also provides opportunities in


networking and contains valuable career tools.


http://www.isc2.org/


 ISACA


This Web site provides access to original research, practical education, career-enhancing


certification, industry-leading standards, and best practices. It also provides a network of like-


minded colleagues and contains professional resources and technical/managerial publications.


https://www.isaca.org/Pages/default.aspx


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 4


Course Outline


Note: Assignments in the following table are listed when they are due.


Grading Category Activity Title


Week 1: Assessing Risk and the Access Control Framework


Required Readings  Chapter 1, “Access Control Framework”  Chapter 2, “Assessing Risk and Its Impact on Access Control”


Discussion Introduction


Lab #1 Configuring an Active Directory Domain Controller


Lab #1 Quiz


Lab #2 Managing Windows Accounts and Organizational Units


Lab #2 Quiz


Week 2: Business Access Control Needs and Requirements


Required Readings  Chapter 3, “Business Drivers for Access Controls”  Chapter 4, “Access Control Policies, Standards, Procedures,


and Guidelines”


Discussion Privacy and Compliance


Lab #3 Configuring Windows File System Permissions


Lab #3 Quiz


Assignment Identification, Authentication, and Authorization Techniques


Week 3: Security Breaches and Business Challenges


Required Readings  Chapter 5, “Security Breaches and the Law”  Chapter 6, “Mapping Business Challenges to Access Control


Types”


Discussion Security Breach Evaluation


Lab #4 Managing Group Policy Objects in Active Directory


Lab #4 Quiz


Lab #5 Configuring Windows Firewall


Lab #5 Quiz


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 5


Grading Category Activity Title


Week 4: Humans and Access Control


Required Readings


 Chapter 7, “Human Nature and Organizational Behavior”  Chapter 8, “Access Control for Information Systems”


Discussion Mapping Business Challenges to Types of Control


Exam Midterm Exam


Week 5: Physical Security and Access Control


Required Readings  Chapter 9, “Physical Security and Access Control”  Chapter 10, “Access Control in the Enterprise”


Discussion Biometric System Evaluation


Lab #6 Managing Linux Accounts


Lab #6 Quiz


Assignment Implementation of Authentication Process


Week 6: Remote Workers and Access Control


Required Readings  Chapter 11, “Access Control System Implementations”  Chapter 12, “Access Control Solutions for Remote Workers”


Discussion Multilayer User Access Control


Assignment Internet/Web Access Management


Week 7: Public Key Infrastructure and Access Control


Required Readings  Chapter 13, “Public Key Infrastructure and Encryption”  Chapter 14, “Testing Access Control Systems”


Discussion Remote Access Method Evaluation


Assignment PKI and Encryption at Work


Week 8: Your Academic Journey Continues…


Discussion Personal Reflection


Assignment Executive Program Practical Connection


Exam Final Exam


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 6


Evaluation and Grading Evaluation Criteria The graded assignments will be evaluated using the following weighted categories:


Category Weight


• Discussions • 20 • Labs • 20 • Assignments • 20 • Midterm Exam • 20 • Final Exam • 20


• TOTAL • 100%


Grade Conversion The final grades will be calculated from the percentages earned in the course, as follows:


Grade Percentage


A 90–100% B 80–89.5% C 70–79.5% F <69.5%


Course Expectations


Academic Integrity At a Christian liberal arts University committed to the pursuit of truth and understanding, any act of


academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty


involves the abuse and misuse of information or people to gain an undeserved academic advantage or


evaluation. The common forms of academic dishonesty include:


a. cheating - using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities


b. lying—falsifying, fabricating, or forging information in either written, spoken, or video presentations


c. plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation


University of the Cumberlands School of Computer and Information Sciences


ISOL 531 – Access Control


Page 7


Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The


potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing


grade for the entire course, or charges against the student with the appropriate disciplinary body.


Late Policy Students are expected to submit classroom assignments by the posted due date and to complete the


course according to the published class schedule. As adults, students, and working professionals I


understand you must manage competing demands on your time. Late assignments will not be accepted for a grade; no exceptions. Absolutely NO assignments will be accepted after the last day of the course.


Students with Disabilities University of the Cumberlands accepts students with certified disabilities and provides reasonable


accommodations for their certified needs in the online classroom or in other areas. For accommodations


to be awarded, a student must submit a completed Accommodations Application form and provide


documentation of the disability. Students who may have a disability meriting an academic


accommodation should contact the Disability Services Coordinator (Nate Clouse, in Boswell Campus


Center) to ensure that their needs are properly evaluated and that documentation is on file. Any


accommodations for disabilities must be re-certified each bi-term by the Disability Services Coordinator


before course adjustments are made by individual instructors.


Student Responsibilities 1. Students are expected to login several times per week to participate in class discussions. 2. Students are expected to find out if any changes have been made in the class or


assignment schedule. 3. Students are expected to be self-motivating in an online, asynchronous course.


Course Summary

Course Number and Name

Course Term and Delivery

Course Instructor

Course Description

Course Objectives

Course Structure

Learning Materials and References

Required Resources

Recommended Materials/Resources

Course Outline

Evaluation Criteria

Grade Conversion

Course Expectations

Academic Integrity

Late Policy

Students with Disabilities

Student Responsibilities

Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Calculation Guru
Helping Hand
University Coursework Help
Writer Writer Name Offer Chat
Calculation Guru

ONLINE

Calculation Guru

I see that your standard of work is to get content for articles. Well, you are in the right place because I am a professional content writer holding a PhD. in English, as well as having immense experience in writing articles for a vast variety of niches and category such as newest trends, health issues, entertainment, technology, etc and I will make sure your article has all the key pointers and relevant information, Pros, Cons and basically all the information that a perfect article needs with good research. Your article is guaranteed to be appealing, attractive, engaging, original and passed through Copyscape for the audience so once they start reading they keep asking for more and stay interested.

$225 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$230 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$232 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

O2 and s2 electron configuration - Symbolism of storms in literature - Sp ausnet new connections - Hexahedron pyramid mathematical name - Greyhound australia baggage allowance - I Need 1500 words on solution a International Management (BUSS 1006)-CW3-Fall-19-QP - Answers to mcgraw hill connect anatomy - Iron carbon phase diagram - Teacher aide award qld - Long term investment decision in financial management - Vcole v south tweed heads rugby league football club ltd - Positive interdependence and knowledge sharing articles - People like us david brooks - As 3700 masonry structures - Name and describe the major capabilities of database management systems - Data Science Case Analysis - Fahrenheit 451 what does mildred do all day - The following refers to units processed in sunflower printing's binding department in march. - America a concise history volume 2 5th edition pdf - Why is voice recognition bad - The legacy chronicles trial by fire pdf - S1 discrete random variables - A project typically has: - NOAA Activity - Anth exam - Bonallack and bishop jobs - Stage 1 assignment IFSM 300 - The comparative balance sheet of yellow dog enterprises in - How did montresor know that the house would be empty - NARRATIVE ESSAY - Uni 5 Ip pc deliver in 12hrs - Six components of macro environment - Financial management institute of canada - Module 4 discussion - Which of the following observations is quantitative - Marketing Reseach - Ib tok grade boundaries - Rocks test year 8 - Mt942 swift message format - Zappos differentiation strategy - Global strategic management mcq - Database input node in iib - Proposal - Self awareness ppt template - Lesson 25 complex and compound complex sentences answers - Bain & company benefits - Bmj open instructions for authors - As nzs 4360 2004 risk management - Pizza hut value chain analysis - Fin 370 week 1 - BUS 745: - Unit 5 IP Monitoring and Evaluating New Programs - NURS495JOURNALWEEK2 - How can presentation aids reduce apprehension - Tagore punishment - Sullivan nicolaides sunshine coast - QUALITATIVE Journal peer-reviewed, Topic - BUSINESS - Pastel de chocolate ser para lucía - Sample letter of withdrawal from school - Brown eyed blue eyes experiment - Dulux crisp linen 61yy 89 040 - Why is water a good solvent - Example of certainty in decision making - Hp alm client registration - 3 times table song mathletics - Beery vmi 6th edition - Game theory behavioral economics - Practical connection - Perception in organizational behaviour ppt - Cat poems for kids - What is a cheque butt - Gas laws virtual lab answer key - The entry to close the income summary account may include - Ancient china unit plan - Australian ideal college hobart - Clinical significance vs statistical significance in nursing research - Cadbury india distribution network - How many earths would we need quiz - Portfolio letter to the reader - Khp and naoh titration equation - Dr andrew dennis mcbride - How to make navy blue icing without black - Merck case study analysis - Mindful reflection as a process for developing culturally responsive practices - Phosphoric acid titration lab report - Mcqs of marketing management by philip kotler 13th edition - Mercer University - Give me liberty eric foner volume 2 4th edition - 7-4 part two - List of printmaking artists - Constructing a field map lab answers - Marketing plan financial projections example - IFRS VS US GAAP Intermediate Accounting 2 - What makes a great screenplay - Tolerable misstatement and sample size - Poole borough council planning - 524 wilson street darlington - How kimberly clark keeps client costco in diapers - Arab - Ineffective individual coping nursing care plan