Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

\"Monitoring the User Domain\" Please respond to the following: It is common kno

ID: 3787570 • Letter: #

Question

"Monitoring the User Domain" Please respond to the following:

It is common knowledge that employees are a necessary part of any business. Identify three (3) best practices in the user domain and suggest the control type(s) (technical or manual) that are best suited to monitor each best practice.

Describe how the implementation process for such controls might vary based on the business type. Determine the impact that other factors such as physical security, device type, and connectivity (wireless or wired) might have on the choices that are made.

Explanation / Answer

It is common knowledge that employees are a necessary part of any business. Identify three (3) best practices in the user domain and suggest the control type(s) (technical or manual) that are best suited to monitor each best practice. Role based access control – Users of the system should only access resources of the system relevant to them. Deny access to system resources unless the user correctly identifies themselves correctly. Access credentials are changed from time to time to avoid identity theft. Describe how the implementation process for such controls might vary based on the business type. Determine the impact that other factors such as physical security, device type, and connectivity (wireless or wired) might have on the choices that are made. Role based access control enables different user groups access business resources that are only relevant to them. This makes the system easy to use for the target users.n Can be implemented by issuance of loin credentials and a login interface. Can be implemented by a script that retires passwords after a specific given time, say after one month after creation