Information systems: identification, authentication, and authorization.

Assume you are the<a href=””> IT manager </a>for a large international organization. You have been asked to assess the company’s information systems and security controls.

Describe identification, authentication, and authorization.
Explore whether or not you would use Windows ACLs and explain your reasoning.
Evaluate best practices for managing Microsoft Windows and application vulnerabilities.
Keep in mind, we are more interested in your ability to describe the steps you would take to review <a href=””>security</a> goals than providing an answer to this scenario. Remember the strategy of Think, Plan, Design, Implement, and Evaluate.


Your paper should be 4-5 pages in length, not including the cover and references pages, and formatted according to APA style guidelines. Use at least two scholarly sources as well as information from your module to support your decision.

It is strongly encouraged that you submit all assignments to the TurnItIn Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the TurnItIn Originality Check – Student Guide for step-by-step instructions.



Looking for help with your homework?
Grab a 30% Discount and Get your paper done!

30% OFF
Turnitin Report
Title Page
Place an Order

Calculate your paper price
Pages (550 words)
Approximate price: -