Premium Essay

Technical Controls Paper

In:

Submitted By Cuzson
Words 905
Pages 4
Technical Controls Paper
A.M
SE578
Gordon Francois
Keller Graduate School of Management
January 22, 2012

Technical Controls
Technical controls use technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. Technical controls are far-reaching in scope and encompass such technologies as: * Encryption * Smart cards * Network authentication * Access control lists (ACLs) * File integrity auditing software
Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, network intrusion detection systems, access control lists, and data encryption are logical controls.
An important logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task. A blatant example of the failure to adhere to the principle of least privilege is logging into Windows as user Administrator to read Email and surf the Web. Violations of this principle can also occur when an individual collects additional access privileges over time. This happens when employees' job duties change, or they are promoted to a new position, or they transfer to another department. The access privileges required by their new duties are frequently added onto their already existing access privileges which may no longer be necessary or appropriate.

How could Administrative, Technical, and Physical Controls introduce a false sense of security?
Administrative, Technical, and Physical controls introduce a false sense of security by the indication of what we use to safeguard delicate data and protect

Similar Documents

Free Essay

Cis 408 Wk 10 Technical Paper

...CIS 408 WK 10 TECHNICAL PAPER To purchase this visit here: http://www.activitymode.com/product/cis-408-wk-10-technical-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 408 WK 10 TECHNICAL PAPER CIS 408 WK 10 Technical Paper - Planning an Application Server Migration Technical Paper: Planning an Application Server Migration Imagine you are working for a large international purchasing company that has just bought a growing local company that manufactures western wear at several locations (it’s a group of cottage industries; remember from the other scenarios that it now has eight (8) satellite offices, four (4) large and four (4) small ones). The previous owner, Sam Yosemite, tells his IT team to provide support and information to your IT staff to help with the transition to your forest domain. Gathering information from the other writing assignment descriptions, decide the best ways to bring the “Wild Frontier” network into your domain, “Foghorn Leghorn” and migrate to your current standards. The business acquisition is largely superficial and the existing personnel structures will remain in place. You have to bring the “Wild Frontier” under the “Foghorn Leghorn” domain and make sure production needs are met at all the satellite locations. Your budget is fairly generous due to allocated funds for the transition, but will likely be much more constrained in the future. Take maintenance costs (both money and man-hours) into consideration as you design your solutions...

Words: 913 - Pages: 4

Premium Essay

Adminstrative Controls

...Administrative Controls Paper Ericka Kelly SEC 578 Professor Costantini Introduction Administrative controls are very important to a company. They are formalized standards, rules, procedures, and control disciplines to ensure that the organization’s general and application controls are properly executed and enforced (Laudon, K p308). Administrative controls demonstrate due care and have an impact on corporate liability. These controls influence the choice of Technical and Physical controls and will affect projects in the IT department if missing. All of these areas will be addressed further in this paper. Administrative Controls & Due Care To understand if administrative controls demonstrate due care, there has to be an understanding of what due care is. Due care is a standard in which one must act in good faith and in a prudent manner. The goal is to avoid negligence. Without administrative controls it would be very difficult to demonstrate due care. For example, a company working with personal information such as a client’s social security or bank account number, it would be wise to have administrative controls in place. This will reduce the chances of corporate officers and any other employee being liable for failing to exercise due care. This brings us to the next section on corporate liability. Corporate Liability Many companies have to go through an audit. The audit will determine if the company...

Words: 638 - Pages: 3

Premium Essay

Security Policies Overcoming Business Challenges

...security controls. The three most common are: physical, technical, and administrative controls; however, many organizations break down administrative controls into two separate categories: procedural and legal controls. "Security controls are the means of enforcing security policies that reflect the organization's business requirements, " (Johnson). Security controls are implemented to guarantee the information security C-I-A triad. Furthermore, security controls fall into three types of control classifications, they are: preventive, detective and corrective. These classifications are used to specify when a security control applies. Physical Controls are exactly what they sound like, physical obstacles used to prevent or deter access to IS resources. Physical controls can be barriers such as locked doors, requiring some sort of authentication/authorization command to enter, like a cipher lock or keycard. Biometric scanners are also excellent controls to identify and allow access to authorized personnel. Video cameras and closed-circuit television are also examples of physical controls. For organizations requiring extreme security measures, perimeter barriers such as walls or electric fences are used; additionally, security guards fall into the physical controls category. Technical Controls are logical and/or software related controls designed to restrict access to the network infrastructure, components, and data. Controls such as discretionary, mandatory access controls, rule-...

Words: 470 - Pages: 2

Premium Essay

Cost Audit

...Effectiveness and efficiency. v) Timing. In an EDP environment, the control procedures take basically two stages: 1. Manual Procedure – i.e. the clerical work done up to the translation of data into machine-sensible form. This stage, being manual, is subjected to usual internal control conditions and the Cost Auditor will have little difficulty in appraising them by means of ‘compliance test’ and ‘substantive’ test’. 2. Computer Procedures – i.e. the computer processing work. Auditing in this area is actually a complex activity, for which the Cost Auditor as a prudent person should develop himself for adequate EDP knowledge. Before the actually starts to conduct his audit in EDP environment he should envisage to maintain an ‘Audit Control File’, as his valuable kit. The Computer Audit control File may be built up containing full details of the system including: i) Copies of all source documents and the details of the checks that have been done to ensure their accuracy. ii) Details of physical control over source documents and any control tools on numbers, quantities, values including the names of the personnel keeping these controls. iii) Full description of how the source documents are to be converted into input media, and the check-cum-control device. iv) A detailed account of the manual internal controls contained in the system, e.g. separation of programmers from operators, control of assets from record keeping, etc. v)...

Words: 709 - Pages: 3

Free Essay

Tools

...Materials Technical Drawing Pens -were originally designed for engineers and architects, but quickly became popular among artists for their precision. Technical Pens are refillable, with either a replaceable ink cartridge system. -it can make lines of constant width, which offer more control and precision than lines that vary in width. Technical pens are also used for loose sketches, like concepts for logos or web designs, as well as freehand doodling. -a "Rapidograph” pen is a trademarked name for one type of technical pen. Compass -are used for inscribing arcs or circles. It can be also used for measuring the distance. Compasses are also used in drafting, mathematics and other purposes. -Compass has 5 parts, the legs, hinge, needle point, pencil lead, and the adjusting nut. Drawing Board -also called Drafting table, Drawing table or Architect’s table. It is a multipurpose desk which can be used for any kind of drawing, writing or sketching on a large sheet of paper or for drafting precise...

Words: 832 - Pages: 4

Premium Essay

Critique of a Quantitative Research Study

...(LoBiondo-Wood et al, 2002). The question was framed around the elements of PICO; standing for “patients,” “intervention,” “comparison,” and “outcome” (Boston University Medline Plus, 2000a; Craig & Smyth, 2002). The PICO approach was developed around Evidence-Based Medicine (Richardson & Wilson, 1997), and was therefore designed for clinical studies, it can though be adapted to any research context. | | |People, patients or population - who are you asking the question about? | |Intervention - what intervention are you interested in? | |Control or comparison - what are you comparing the intervention to? | |Outcome - what outcome are you interested in measuring? | Table 1: PICO criterion People or population of personal interest means the intended study subjects, for example, Post qualifying nursing students studying Anaesthetic Practice. Intervention generally means the aspect of the people or population that is the main...

Words: 4518 - Pages: 19

Premium Essay

Administrative Controls

...Administrative Controls Paper 1. How do Administrative Controls demonstrate "due care?" Administrative controls demonstrate “due care” because they are controls that meet a standard considered reasonable by most organizations that share similar backgrounds or work environments. Administrative controls that meet the standard of “due care” generally are easily achievable for an acceptable cost and reinforce the security policy of the organization. They must include controls that contribute to individual accountability, auditability, and separation of duties. Administrative controls define the human factors of security and involve all levels of personnel within an organization. They determine which users have access to what organizational resources and data. Administrative controls can be broken down into two categories: preventive administrative controls and detective administrative controls. Preventive administrative controls are techniques designed to control personnel’s behavior to assure the confidentiality, integrity, and availability of organizational information. Some examples of preventive administrative controls are: security awareness and technical training, separation of duties, disaster preparedness and recovery plans, terminating and recruiting procedures, and user registration for computer access. 2. How does the absence of Administrative Controls impact corporate liability? The absence of administrative controls will have a negative impact on corporate liability...

Words: 902 - Pages: 4

Premium Essay

Swateer

...this paper is to suggest a set of best organization structures for efficient supply chain management. For this, this paper derives organization types for supply chain management according to the formalization and centralization level of an independent department responsible for supply chain management (SCM) activities, and hierarchical relationship in organizational position and operational responsibility between the SCM department and existing other functional departments. And then, this paper identifies organizational characteristics, which have significant influences on SCM performance by investigating the difference in performance across the proposed organization types. From the results of empirical test, this paper finds that even though too excessive formalization and centralization of the SCM department within a firm may interrupt complete SC integration and performance improvement, a certain range of control by the SCM department is inevitable to build the fundamentals of integrated supply chain management, and thus the temporary pursuit of intensive control focused organization type such as integrated line organization may be considered depending on firm characteristics and environmental change. However, the empirical results further indicate that in the long run, intermediate organization types such as Functional and Process Staff organization that the SCM department maintains an adequate level of balance and harmony with other functional departments while it controls,...

Words: 13751 - Pages: 56

Premium Essay

Paper 2

...Paper 2 Submitted by: Courtnay Avery Keller Graduate School of Management SE578 3/20/11 Table of Contents How could administrative, technical, and physical controls introduce a false sense of security?...............3 What are the consequences of not having verification practices?..............................................................3 What can a firm do to bolster confidence in their defense-in-depth strategy?..........................................4 How do these activities relate to best practices? ……………………………………………………………………………………4 How can these activities be used to demonstrate regulatory compliance? …………………………….………………5 References …................................................................................................................................................6 How could administrative, technical, and physical controls introduce a false sense of security? Administrative, Technical, and Physical controls introduce a false sense of security by the indication of what we use to safeguard delicate data and protect individuals’ privacy. Any complex system is prone to inherit a false sense of security. Having a false sense of security is widespread among individuals who own and operate a personal computer within their homes. Nothing is ever really secured. It would be safe to say that something is secured within the terms of information security. [ (Nahn, 2008) ] The idea of purchasing a virus protection suggests that all personal information...

Words: 855 - Pages: 4

Premium Essay

Project Implementation, Control, and Termination Paper

...| Syllabus School of Business MGT/437 Version 4 Project Management | Copyright © 2009, 2006, 2004 by University of Phoenix. All rights reserved. Course Description This course examines project management roles and environments, the project life cycle, and various techniques of work planning, control, and evaluation for project success. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Kerzner, H. (2006). Project management: A systems approach to planning, scheduling, and controlling (9th ed.). Hoboken, NJ: Wiley. Meredith, J. R. & Mantel, S. J. (2006). Project management: A managerial approach (6th ed.). Hoboken, NJ: Wiley. All electronic materials are available on the student website. Software Microsoft® Project® 2007 (Virtual Desktop) Week One: Project Definition | | Details | Due | Points | Objectives | 1.1 Determine the importance...

Words: 1839 - Pages: 8

Free Essay

No Title

...and tailored routes to accounting-support roles, leading to high-performing and rewarding career options for those who progress to the ACCA Qualification.” Aude Leonetti Acting executive director – learning 3 INTRODUCTION ACCA’s entry-level suite of awards – Foundations in Accountancy – is being introduced after detailed consultation which commenced in 2008 with ACCA stakeholders, including employers, learning providers, members, students, other professional accountancy bodies and regulators. Foundations in Accountancy will provide even greater access to the ACCA Qualification and aims to satisfy the needs of employers by allowing individuals to choose from a flexible range of qualifications which will help them develop the relevant technical knowledge and practical skills required to perform in accounting...

Words: 3107 - Pages: 13

Premium Essay

Qnt561 Course Design

...| Syllabus School of Business QNT/TM561 Version 2 Research and Statistics for Process Control | Copyright Copyright © 2009, 2005 by University of Phoenix. All rights reserved. University of Phoenix® is a registered trademark of Apollo Group, Inc. in the United States and/or other countries. Microsoft®, Windows®, and Windows NT® are registered trademarks of Microsoft Corporation in the United States and/or other countries. All other company and product names are trademarks or registered trademarks of their respective companies. Use of these marks is not intended to imply endorsement, sponsorship, or affiliation. Edited in accordance with University of Phoenix® editorial standards and practices. Course Description This course prepares graduate students to apply statistics and probability concepts to business decisions in organizations that focus on process improvement. Students learn criteria for developing effective research questions, including the creation of appropriate sampling populations and instruments. Other topics include descriptive statistics, probability concepts, confidence intervals, sampling designs, data collection, and data analysis—including parametric and nonparametric tests of hypothesis and regression analysis. Policies Students/learners will be held responsible for understanding and adhering...

Words: 2122 - Pages: 9

Premium Essay

Strategy Implementation at Art Corporation

...ASSIGNMENT CORPORATE STRATEGY - MBL93DU DETAILS Kudzai Lister Pasipanodya 2 Newcastle Road Workington Harare Zimbabwe +263773205843 ASSIGNMENT DETAILS Submitted By | Kudzai Lister Pasipanodya | Student Number | 78043824 | Date Submitted : | 29/05/2015 | Module Code | MBL93D-U | Assignment Number | Assignment 1 | Lecturer Name | Dr F du Toit | PERCENTAGE OBTAINED: __________________________ LECTURER COMMENTS: UNISA GRADUATE SCHOOL OF BUSINESS LEADERSHIP MASTER OF BUSINESS LEADERSHIP CORPORATE STRATEGY ASSIGNMENT AMALGAMATED REGIONAL TRADING (ART) CASE STUDY KUDZAI LISTER PASIPANODYA 78043824 Date: 29 May 2015 TABLE OF CONTENTS 1.0 EXECUTIVE SUMMARY…………………………………………………………………….4 1.1. ART Corporation Introduction………………………………………………………4 1.2. ART Corporation Organizational and business structure………………..…..5 2.0 ART’S CORPORATE STRATEGY…………………………………………………………..7 2.1. What is corporate strategy…………………………………………………..………7 2.2. Corporate parenting & corporate strategy…………………………………..…..8 2.2.1. Definition of a corporate parent……………………………………………………8 2.2.2 ART as a Corporate parent………………………………………………………….9 2.2.3 ART’S approach as a corporate parent…………………….……………………12 3.0 ART’S CORPORATE STRATEGY………………………………………………….……..13 3.1. Restructuring…………………………………………………………………………13 3.2. Investment...

Words: 3911 - Pages: 16

Free Essay

Electronic Data Interchange

...ELECTRONIC DATA INTERCHANGE: ORGANISATIONAL OPPORTUNITY, NOT TECHNICAL PROBLEM Paula M.C. Swatman School of Mathematical and Physical Sciences Murdoch University South Street, Murdoch, W.A. 6150. Paul A. Swatman School of Computing Science Curtin University of Technology G.P.O. Box 1982 Perth, W.A. 6001 ABSTRACT Electronic Data Interchange (EDI) enables organisations to send and receive standardised business communications more quickly, flexibly, cheaply and with greater security and accuracy than is possible with conventional postal services. It is not, however, merely another telecommunications advance, but rather provides a means by which organisations can introduce seamless inter-connection within and across organisational boundaries. This paper summarises the background and development of EDI and the benefits to be obtained from its integration into internal and external organisational systems and considers the future of EDI and inter-organisational information systems in general. It then discuss the organisational issues involved in implementing EDI, dispelling the myth that EDI is an issue relevant only to computer communications professionals, pointing out the fact that EDI is a major strategic opportunity which must be addressed at senior levels within implementing organisations. This paper was presented to "DBIS ’91" the 2nd Australian Conference on Database and Information Systems, held at the University of New South Wales in February 1991. It has since been...

Words: 7468 - Pages: 30

Premium Essay

Ccccccccccvvvvvvvvvvvvv

...Material Materials Management Procurement & Purchase Inventory Management Commercial Operations Office Management (Paper/Tyre / Rubber processing/ Carbon Black Industry/ Chemical/Steel/processing industry/Trading Houses) ------------------------------------------------- ------------------------------------------------- High accomplished professional; hold more than two decades of enriched experience in Techno-commercial function of raw material testing/handling/logistics, laboratory operations, Compound mixing & development, material & source development (both domestic & overseas). ------------------------------------------------- ------------------------------------------------- Demonstrated abilities in development of new source & material as per industry requirement. Intensively travelled various parts of the country and China for development & procurement of Bead Wire, Carbon Black, Polymer, tyre cord fabric, Natural Rubber, rubber chemicals & coal. ------------------------------------------------- ------------------------------------------------- Offer active participation in factory level scrap control and auditing related to ISO, TS16949, OHSAS & SA8000 activities. ------------------------------------------------- ------------------------------------------------- KRAs- Raw Material Control (Procurement/New source development, trial & approval, logistics & Purchase) ------------------------------------------------- ...

Words: 777 - Pages: 4