MIS Breaches in Access Control Security 2 Article Reviews

Anonymous
timer Asked: Feb 4th, 2019
account_balance_wallet $9.99

Question Description

For this assignment you are required to search the school library or the internet for two articles stating that the failure of access control contributes to a security breach. This breach could either be in a public or private organization. You will then write 2-5 pages using proper APA formatting to fully explain the following:

First Company

  • What type of breach occurred?
  • What was stolen? (if any)
  • How is access control to be blamed?
  • What security protocol would you put in place to ensure such occurrence does not reoccur?

Second Company

  • How did this breach occur?
  • What role did the lack of access control play in this breach?
  • If you were Lead Security Analyst for this company what strategies would you have implemented to reduce or eliminate this vulnerability?

Assignment Requirements

Please use the Individual Project (IP) title page template file attached to this question

Your SA score should not be more than 30%. All paragraphs must be indented and have at least four complete sentences. You should also use sub-headers for each question. In-text citations and a reference list are also a requirement. You need to have at least 7 different cited sources. Please ensure that all cited sources are credible.

Unformatted Attachment Preview

Running head: NAME OF COURSE 1 Student’s Name School Name Your Assignment Name (e.g. Week 4 Individual Project) Your Professor Name Date SHORTENED COURSE NAME 2 Abstract An abstract is a single paragraph, without indentation, that summarizes the key points of the manuscript in 150 to 250 words. The purpose of the abstract is to provide the reader with a brief overview of the paper. This template is based on 6thed of the Publication manual of the American Psychological Association. Note: an abstract is only required if the assignment calls for it. Consult with your instructor. SHORTENED COURSE NAME 3 Type Your Title Here Begin writing your paper with a .5” indent and continue the paper with an indent for each new paragraph. Heading Level 1, Centered, Boldface Heading Level 2, Flush left, Boldface, Uppercase and Lowercase Heading level 3, indented, boldface, lowercase ends with period. Heading Level 4, indented, boldface, lowercase, italicized, ends with period. Heading level 5, italicized, lowercase, ends with a period Note: Depending on the length and complexity of your paper you will use different levels of headings. SHORTENED COURSE NAME 4 References ...
Purchase answer to see full attachment

Tutor Answer

CleoVin
School: University of Virginia

Attached.

Running head: BREACHES IN ACCESS CONTROL SECURITY

Student’s Name
School Name
Breaches in Access Control Security
Your Professor Name
Date

1

BREACHES IN ACCESS CONTROL SECURITY
2
Abstract
Access control is a technique applied in security which regulates who can acquire entrée, what
can be viewed or use and manipulate the resources in a computing environment. This is a vital
aspect of security aimed at diminishing hazards to the organization and its business. Access
control can hence be categorized into two types, these are: physical and logical. The Physical
access control restricts access into buildings, campuses, rooms and the physical IT assets. On the
other hand, Logical access control regulates accessibility to connections, system files, computer
networks and the data. In order to secure an organizations facility access control system which,
rely on the credentials its users, access card readers, passwords, employee tracking should be
applied.
However, despite of such measures being kept in place breaches still do occur leaving behind
massive negative effect to the organization in the aftermath such as: paying off fines, the
reputational damage, effect on company's customer base due to lose confidence in the company
and the brand and the feeling that their information is no longer secure. Number of companies
have faced security breaches including Yahoo, Facebook, Marriott, Exactis, Quora, British
airways, Ticketmaster just to name a few. This paper analyzes the security breaches occurring at
the British Ai...

flag Report DMCA
Review

Anonymous
Good stuff. Would use again.

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors