Free Essay

Assessment Questions It

In:

Submitted By HeatherYoung
Words 993
Pages 4
Lab #3 – Assessment Worksheet
Identify & Classify Data for Access Control Requirements
Course Name & Number: IS3230 ______________________________________________________________
Student Name: Heather Young ______________________________________________________________________
Instructor Name: MR. Gibbs _____________________________________________________________________
Lab Due Date: Jan. 2014 _______________________________________________________________________
Overview
This lab provides the student with the opportunity to develop a data classification standard with procedures and guidelines to classify data access based on the job responsibilities – not an organizational position. In this lab, students aligned a data classification standard with the job function and roles that are required to access specific data. This alignment allows access controls policy definition to be properly implemented throughout the IT infrastructure to mitigate risk from unauthorized access.
Lab Assessment Questions & Answers
1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications.
Top Secret- highest level of information sensitivity
Secret- information that would cause serious damage, most common classification level
Confidential- Is the lowest of sensitivity. This information may only be handled by personnel with a clearance, may not be disclosed to the public, and must disposed of in a secure manner.
Unclassified- Is not actually a classification level, it is the lack of classification level. It is used for information that the government has not classified under the security classification system
Controlled Unclassified Information (CUI)- there were hundreds of sub classifications , each with their own rules. They have now all been condensed into one category called CUI. Anyone can get access to unclassified information through legal means via a Freedom of Information Act (FOIA) request

2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.
Need to have the employee change the password every month or so.
3. What permissions are necessary to allow an Active Directory Group called AD_Group to read and write files in a sensitive directory such as C:\ERPdocuments\HRfiles?
The Active Directory Schema snap-in allows schema administrators to manage the Active Directory schema by creating and modifying classes and attributes, and specifying which attributes are indexed and which attributes are to be catalogued in the global catalog. Administrators will not perform schema management tasks on a frequent basis, and they should take some care when modifying the schema. Management of the schema is restricted to a group of administrators called schema administrators. There are three safety precautions that control and limit schema modification: * By default, all domain controllers permit Read access to the schema. A registry entry must be set on a domain controller to permit Write access to the schema on that domain controller. * The schema object is protected by the Windows 2000 Security model; therefore, administrators must be given explicit permissions or be members of the Schema Administrators group to make changes to the schema. * Only one domain controller can write to the schema at any given time. This role is known as Schema Floating Single Master Operations (FSMO). You must be connected to the schema FSMO to manage the schema.

4. How would you apply the permissions (ACLs) stated above (M,RX) to the AD_Group on C:\ERPdocuments\HRfiles from the command prompt using built-in Windows tools?
You can use Xcacls.exe to set all file-system security options that are accessible in Windows Explorer from the command line. Xcacls.exe does this by displaying and modifying the access control lists (ACLs) of files.

5. When adding permissions to a directory in an Active Directory Domain, would you prefer to add Groups or individual User accounts to said directories? Explain. * Domain user accounts refer directly to the accounts in Active Directory. * SharePoint user accounts refer to the user accounts added to Windows SharePoint Services from Active Directory (or other authentication source).

6. Based on Microsoft’s Step-by-Step Guide on Understanding GPOs http://technet.microsoft.com/enus/library/bb742376.aspx what is the significance of the “Block Inheritance” feature of GPOs and why would it be used?
You can block inheritance for a domain or organizational unit. Blocking inheritance prevents Group Policy objects (GPOs) that are linked to higher sites, domains, or organizational units from being automatically inherited by the child-level.

7. What is the importance of the Security Groups created and why would we setup Security Group Filtering for GPOs as we have done?
Group Policy settings are enforced voluntarily by the targeted applications. In many cases, this merely consists of disabling the user interface for a particular function without disabling lower-level means of accessing it.
Alternatively, a malevolent user can modify or interfere with the application so that it cannot successfully read its Group Policy settings, thus enforcing potentially lower security defaults or even returning arbitrary values.

8. Explain the Principle of Least Privilege.
The principle of least privilege (POLP) is an information security term that refers to a design objective in computing that a given user should only be able to access the information and resources he or she requires for legitimate reasons. POLP states that every module of a system, such as a process, user or program should have the least authority possible to perform its job.

9. How does a Data Classification Standard influence your access control strategy?
Data classification is the need for a tiered storage architecture, which will provide different levels of security within each type of storage, such as primary, backup, disaster recovery and archive -- increasingly confidential and valuable data protected by increasingly robust security. The tiered architecture also reduces costs, with access to current data kept quick and efficient, and archived or compliance data moved to cheaper offline storage.
10. List and explain at least 1 benefit derived from properly implementing the Principle of Least Privilege.
The purpose of this principle is that if an account is compromised, an attacker will have minimal set of privileges and will not be able to use the comprised account to do real damage to the entire system.

Similar Documents

Premium Essay

5 Question Assessment Paper

...5 Question Assessments Chronological Life Events • Ms. Shelly Skelton DOB 10/26/1985 Mother (PARAN) • Anthony Flores DOB 07/16/2002 Son (PIR) • Madison Flores DOB 07/17/2008 Daughter (PIR) • Family does not have any prior history with JCDHR, or any other county. • A report can in concerning the safety and well being of the children. The report stated that there is no working power, and the home is dirty. Also stated that there is a pit bull that use for fighting, and the dog poops all over the porch, and it’s rarely cleaned up. The report stated that Anthony is known for wearing dirty clothes to school, the mother Ms. Skelton is a “pill head” that abuses loratabs, opiates, and methadone. The report stated that Ms. Skelton allows her sister to smoke meth in the back room of the home, and that Ms. Skelton slaps and yells at Madison. The report also stated that there is never any food in the home for the children. Area of Concern • The safety of the children. • The potential for future maltreatment as it relates to no food in the home, no working power, and the house being excessively dirty. • The children not having food. • Anthony going to school dirty. • Ms. Skelton not performing parental duties and responsibilities. • Living arrangements seriously endanger a child’s physical health. Potential Team Members/Projected Outcome • Social worker • Social worker supervisor • Ms. Shelly Skelton ...

Words: 311 - Pages: 2

Premium Essay

Lab 1 & Assessment Questions

...IT255 Lab 1 & Assessment Questions Starting Nmap 5.21 ( http://nmap.org ) at 2012-03-28 19:38 Eastern Standard Time Nmap scan report for 172.30.0.10 Host is up (0.0054s latency). Not shown: 92 closed ports PORT STATE SERVICE 53/tcp open domain 88/tcp open kerberos-sec 135/tcp open msrpc 139/tcp open netbios-ssn 389/tcp open ldap 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1027/tcp open IIS MAC Address: 00:0C:29:99:40:7B (VMware) Skipping SYN Stealth Scan against 172.30.0.75 because Windows does not support scanning your own machine (localhost) this way. Nmap scan report for 172.30.0.75 Host is up. PORT STATE SERVICE 7/tcp unknown echo 9/tcp unknown discard 13/tcp unknown daytime 21/tcp unknown ftp 22/tcp unknown ssh 23/tcp unknown telnet 25/tcp unknown smtp 26/tcp unknown rsftp 37/tcp unknown time 53/tcp unknown domain 79/tcp unknown finger 80/tcp unknown http 81/tcp unknown hosts2-ns 88/tcp unknown kerberos-sec 106/tcp unknown pop3pw 110/tcp unknown pop3 111/tcp unknown rpcbind 113/tcp unknown auth 119/tcp unknown nntp 135/tcp unknown msrpc 139/tcp unknown netbios-ssn 143/tcp unknown imap 144/tcp unknown news 179/tcp unknown bgp 199/tcp unknown smux 389/tcp unknown ldap 427/tcp unknown svrloc 443/tcp unknown https 444/tcp...

Words: 1062 - Pages: 5

Free Essay

Lab 1 Assessment Questions

...Lab 1 Assessment Questions: 1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA department LANs, departmental folders, and data. By establishing security principle within the Active Directory Domain. 2. Is it a good practice to include the account and user name in the password? Why or Why not? No it is not a good idea to include the account and user name in the password because there are Hackers out there who would use either a dictionary attack or brute force attacks which go though lists to find the correct combination of words, letters, numbers and characters in order to crack user names and passwords which depending on how simple or complex it is can take anywhere from 5 minutes or 5 months to decrypt, so it is a good practice to keep everything as unique as possible. 3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality? In this case the best way to ensure a strong password is to use 8 or more characters such as a mixture of Uppercase. Lowercase, numbers, and symbols in order to create a complex password that would be very difficult to crack. 4. Can a defined user in Active Directory access a shared drive if that user is not part of the domain? No they should not be able to access the shared folders unless they have authorized access. 5. Does Windows Server 2008 R2 require a user’s logon/password credentials prior...

Words: 469 - Pages: 2

Premium Essay

Unit I Assessment - Essay Questions

...11. Organizations exist because of their ability to create value and acceptable outcomes for stakeholders. Describe and explain how organizations create value and influence stakeholders? What is the role of entrepreneurship in this process? According to Jones, there are three stages that must take place in order for value to be created. Depending on how an organization pulls from its environment, heavily reflects its chances to produce goods and services, which affects the actual value the organization creates at the input stage. Inputs include various resources, like machinery, raw materials, information and knowledge, money and capital, and of course human resources (Jones, 2010). The main goal throughout the conversion stage is to allow service organizations to create value by applying compiled skillsets to yield an output, such as aiding patients through physical and/or occupational therapy (Jones, 2010). When considering entrepreneurships’ role in the value creating process, it is not only a component that maintains the organization but it also begins one. Either an individual or group perceived a particular good or service is needed and either invested or found investors to create the organization and meet the needs of the consumers. References: Jones, G. (2010). Organizational theory, design, and change. 12. What is the relationship among organizational theory, design, change, and organizational structure and culture? Jones states that organizational...

Words: 466 - Pages: 2

Premium Essay

Lab 5 Assessment Questions & Answers

...1. How does a security awareness & training policy impact an organization’s ability to mitigate risks, threats, and vulnerabilities? Security awareness training is a formal process for educating employees about computer security. A good security awareness program should educate employees about corporate policies and procedures for working with information technology (IT).  Employees should receive information about who to contact if they discover a security threat and be taught that data as a valuable corporate asset. 2. Why do you need a security awareness & training policy if you have new hires attend or participate in the organization’s security awareness training program during new hire orientation? An employee security awareness program can alleviate the problem of employee security breaches by clarifying why security is important. 3. What is the relationship between an Acceptable Use Policy (AUP) and a Security Awareness & Training Policy? An acceptable use policy (AUP) is a document that outlines a set of rules to be followed by users or customers of a set of computing resources, which could be a computer network, website or large computer system. Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology. 4. Why is it important to prevent users from engaging in downloading or installing applications and software found on the Internet? There are hundreds...

Words: 717 - Pages: 3

Premium Essay

Lab 3 Assessment Questions Is3350

...1. Did CardSystems Solutions break any federal or state laws? • Federal Trade Commission presented a decision order on CardSystems Solutions and its predecessors as a result of negligence and violation of FTC Act 15, U.S.C. 41-58. 2. CardSystems Solutions claim to have a hired an auditor to assess compliance with PCI DSS and other best practices for ensuring the C-I-A of privacy data for credit card transaction processing. Assuming the auditor did indeed perform a PCI DSS security compliance assessment, what is your assessment of the auditor’s findings? • If compliant they would have implemented proper IP s firewalls or maintained their anti-virus program definitions. Also they were required to encrypt all stored sensitive privacy data for research. 3. Can CardSystems sue the auditor for not performing his or her tasks and deliverables with accuracy? Do you recommend that CardSystems Solutions pursue this avenue? • No because they were PCI DSS compliant in 2004 but was not certifiably compliant at the time of attack in June of 2005. 4. Who do you think is negligent in this case study and why? • CardSystems. Given their high profile, they were expected to be in compliance for properly storing and protecting all privacy data including gathered transactions and credit card information of their cliental in an encrypted manner. 5. Do the actions of the CardSystems warrant an “unfair trade practice” designation as stated by the Federal Trade Commission (FTC)? • Yes,...

Words: 649 - Pages: 3

Premium Essay

Econ Week 1 Assessment Questions

...Question 1.1. (TCO 1) Economics is the study of (Points : 1) increasing the level of productive resources so there is maximum output in society. increasing the level of productive resources so there is a minimum level of income. how people, institutions, and society make choices under conditions of scarcity. the efficient use of scarce resources paid for at the minimum level of cost to consumers and businesses. Question 2.2. (TCO 1) The basic economic problem is essentially one of deciding how to make the best use of (Points : 1) limited resources to satisfy limited economic wants. limited resources to satisfy unlimited economic wants. unlimited resources to satisfy unlimited economic wants. unlimited resources to satisfy limited economic wants. Question 3.3. (TCO 1) From an economic perspective, when a student decides to attend another year of college, the student has concluded that the marginal (Points : 1) costs of attending college has decreased that year. benefits of attending college has increased that year. benefits of attending college are greater than the marginal costs. costs of attending college will be subsidized by someone else such as parents or the government. 4. (TCO 1) The individual who brings together economic resources and assumes the risk in a capitalist economy is called the (Points : 1) manager. entrepreneur. ...

Words: 481 - Pages: 2

Premium Essay

Spiritual Assessment

...Spiritual Assessment NUR 645E Grand Canyon University April 3, 2013 Abstract Evidence has linked a strong relationship between spirituality and medicine. There is a positive correlation between a patient’s spirituality or religious commitment and health outcomes. A spiritual assessment as a part of a health assessment is a practical step to incorporating patient’s spiritual needs into practice. The FICA Tool and HOPE Questions provide serve to assist clinicians in the spiritual assessment process. By examining the research done using these tools, it has been determined that the FICA Tool is easy to use and provides basic data on a patient’s spirituality. The FICA tool is both reliable and valid. The HOPE Questions are easy to use and provides details on a wide range of aspects related to multicultural beliefs. The HOPE Questions is not supported by research thereby it is not valid or reliable. Key Words: spiritual assessment, FICA Spiritual Assessment Tool, HOPE Questions Spiritual Assessment Taking patients spiritual needs into account is an integral component of providing holistic care. Research has linked positive health outcomes with patients whose spiritual needs have been addressed. However, spirituality is not always considered an important part of a patient’s well-being; leading to spiritual assessments not being completed. To aid in addressing a patients spiritual needs, there are spiritual assessment tools available. Some of the tools available...

Words: 1533 - Pages: 7

Premium Essay

Alevel

...IGCSE Economics Sample Assessment Materials (SAMs) Edexcel IGCSE in Economics (4EC0) First examination 2011 Edexcel, a Pearson company, is the UK’s largest awarding body, offering academic and vocational qualifications and testing to more than 25,000 schools, colleges, employers and other places of learning in the UK and in over 100 countries worldwide. Qualifications include GCSE, AS and A Level, NVQ and our BTEC suite of vocational qualifications from entry level to BTEC Higher National Diplomas, recognised by employers and higher education institutions worldwide. We deliver 9.4 million exam scripts each year, with more than 90% of exam papers marked onscreen annually. As part of Pearson, Edexcel continues to invest in cuttingedge technology that has revolutionised the examinations and assessment system. This includes the ability to provide detailed performance data to teachers and students which help to raise attainment. We will inform centres of any changes to this issue. The latest issue can be found on the Edexcel website: www.edexcel.org.uk. Acknowledgements This document has been produced by Edexcel on the basis of consultation with teachers, examiners, consultants and other interested parties. Edexcel acknowledges its indebtedness to all those who contributed their time and expertise to its development. Every effort has been made to contact copyright holders to obtain their permission for the use of copyright material. Edexcel will, if notified, be happy...

Words: 4711 - Pages: 19

Premium Essay

Algebra Assessment Analysis

...Overview of Assessment Plan The following assessment plan for the Algebra 1 unit in Polynomials is explicitly outlined in the table which can be found toward the end of this section. For each of the goals mentioned, a pre-, post, and formative assessment has been aligned with the learning goals. Modifications and adaptations are taken into consideration while working with Gift and Talented students in the classroom. Description of Pre-Post Assessments The following pre-assessments, post-assessments attached below will be presented to a 9th grade Algebra 1 class. Before beginning a lesson, it is important to measure at what comprehension level our students are in order to modify the lesson accordingly and prepare differentiated instruction...

Words: 789 - Pages: 4

Premium Essay

Bio-Psychosocial Assessment Paper

...Introduction The bio-psychosocial assessment is an important document that develops a plan of action for all the work that follow in the clinical setting. Curtis and Christian (2012) mentions when assessments are conducted effectively, clients gain a better understanding of how they can play a role in their treatment process. Debb and Blitz (2010) noted that to aid patients in positive outcomes, clinicians must formulate a clear conceptualization of how a protracted medical condition affects the life course of their patient. The clinician or behavioral health care providers form a structured framework to identify symptoms of a medical or mental health condition through their assessments. Further, in the bio-psychosocial assessments dimensions...

Words: 688 - Pages: 3

Premium Essay

Spirituality Need Assessment

...ASSESMENT Spirituality Need Assessment Elsamma Philip Grand Canyon University HLT- 310 V Verree Laughlin June 10, 2012 Spirituality Need Assessment Introduction Numerous studies conducted showed positive correlation between spirituality and treatment outcomes (Oakley, P.T., D.H.Sc, Katz, Sauer, Dent, & Millar, 2010). Therefore spiritual needs of the patient must be meet by the healthcare professional. The spiritual needs of the patient can be analyzed and recognized in the process of spiritual assessment. The spiritual assessment consists of a survey/ questionnaire that helps the caregiver get information on the patients spiritual demands. The spiritual assessment allows the healthcare provider to meet the spiritual demands of the patient and their family. This enables the patient to receive holistic treatment which includes recognizing and responding to the physical, psychological, spiritual and emotional needs of the patient (Bruce, 2007). According to the joint commission anyone who is trained on the value of spiritual assessment and tools such as physicians, therapists, nurses, and clinical pastoral staff can assess the patient’s spirituality (Evaluating your Spiritual Assessment Process, 2005). The Joint Commission has also provided some guidelines to create a spiritual assessment that would meet the spiritual demands of the patient. Using these guidelines, a spiritual assessment is made to assess the spiritual needs of a friend...

Words: 1208 - Pages: 5

Premium Essay

Assessment of a Scheme of Work

...Assessment could be defined as the “process of gathering, interpreting, recording and using information about students’ responses to an educational task. “(Harlen, Gipps, Broadfoot, Nuttal. 1992. P.214) It is a part of everyday life for all teachers; it is an integral part of teaching and learning and is a basis for planning lessons and schemes of work based on national curriculum. The main function of assessment is to support teachers and learners in achieving their objectives and aims; by providing information about the progress of learners and by helping institutions to improve and perform better. Assessment can sometimes be seen as something extra that teachers have to undertake, outside of their daily routines; such as invigilating exams or taking books home to mark after school; although assessment is not just marking and awarding grades. It involves identifying at what stage of learning each pupil or student is at, as well as highlighting any miscomprehensions within their learning. It is then possible for a teacher to fill these voids of knowledge and plan lessons appropriately by tailoring lessons to the academic needs of the learners. Using assessment is vital for any learning facilitator and it therefore underpinned by the governments teaching standards, which also make assessment very necessary. Teaching standard 6 requires that to “Make accurate and productive use of assessment”. (URL 5) Assessment itself is a very broad term and many variations exist with...

Words: 4138 - Pages: 17

Premium Essay

Accg301

...Organisational Planning and Control ASSESSMENT GUIDE Session 2, 2015 Department of Accounting and Corporate Governance The most efficient way to contact staff is via email using your student email account. Please use this form of contact in the first instance for general course enquiries. We will only receive emails sent to the subject email account accg301@mq.edu.au ACCG301 Assessment Guide Session 2, 2015 1 MACQUARIE UNIVERSITY FACULTY OF BUSINESS AND ECONOMICS ASSESSMENT GUIDE Assessment Task 1 Title/Name Description Assessment Task 2 Assessment Task 3 Assessment Task 4 Assessed Coursework (Pre-set Tutorial Questions) The objective of this assessment is to provide students with an opportunity to demonstrate that they are working continuously throughout the session to achieve the learning outcomes of the unit. This assessment is based on students’ completion of pre-set tutorial questions on a weekly basis and their effort in attempting additional questions in class. Case Study/Report: Group Based Research Report The objective of this assessment is to encourage students to analyse published academic research papers, to locate and research profiles of organisations globally, and demonstrate understanding of a range of theoretical concepts relating to organisational planning and controls, as they apply to these organisations. Given that research is often conducted in teams, this assessment is done in groups so that students...

Words: 4411 - Pages: 18

Free Essay

Ctl Sitxcom401 Oct 2015 10

...Assessment Tool - Combined
Hospitality Department
Off-campus training
 Qualification code & title SIT30112 – Certificate III in Travel and Tourism SIT30612 – Certificate III in Events SIT30713 – Certificate III in Hospitality SIT31212 – Certificate III in Holiday Parks and Resorts SIT40212 - Certificate IV in Travel and Tourism SIT40812 - Certificate IV in Holiday Parks and Resorts SIT40313 – Certificate IV in Hospitality SIT50112 – Diploma of Travel and Tourism SIT50212 – Diploma of Events SIT50313 – Diploma of Hospitality SIT60112 – Advanced Diploma of Travel and Tourism SIT60212 – Advanced Diploma of Events SIT60313 – Advanced Diploma of Hospitality Unit code/s & title/s SITXCOM401 – Manage conflict Learner name and ID Email Assessor name E-mail Telephone Task Method Due date Weighting 
(if relevant) 1 Written Questions 2 Observation Report 3 Portfolio of Evidence Note: If you are completing a Certificate IV or higher, your assessment might be graded. Please refer to the Course Handbook for Learners for information about Graded Assessment. Assessment Task 1-3 OFFICE USE ONLY © Goulburn Ovens Institute of TAFE 2014 Goulburn Ovens Institute of TAFE. Provider No: 3094 Author: Hospitality Department  This work is subject to copyright. Apart from any use as permitted under the Copyright Act 1968 and its amendments, no part may be reproduced without prior permission. Requests and enquiries...

Words: 2676 - Pages: 11