Colorado ITS481 Access Control Lists and Two Step Authentication Essay

Question

Dot Image

ITS 481 CSUGC Access Control Lists and Two Step Authentication Essay

ACCESS DENIED: ACL RESEARCH

For this week’s assignment, begin your paper by describing an access control list for computing systems, servers, network equipment, and entry to restricted areas.  Then, discuss implementation of some form of two factor authentication.  This could be smart card, smart chip, biometric, or even key pads and cipher locks.  Analyze the strength of these processes as well as their drawbacks.  Conduct thorough research and use your research to discuss the various different access control mediums available in addition to your selected method. Disclose why you believe yours would be successful.

 

CAPSTONE ESSAY

We are nearing the end of your pursuit of your degree and it is time to select your capstone project. For the project, you will submit one portfolio milestone each week during your time in this course. Decide now whether you would like to write a paper or create a presentation for this capstone project. If you decide you would like to write a paper, you will choose this option for this week’s assignment, and choose all “Option #1” Portfolio Milestone assignments for the upcoming weeks.

This week, you will submit a project proposal for your Portfolio Milestone assignment. Create a one-page paper that outlines and summarizes the project topic you have selected. Justify your reasoning for choosing your topic. Include your projected timeline for your project showcasing appropriate deadlines in keeping with completion of the project.  The following are some examples of project topics that you may choose from, although you are welcome to create your own topic as well:

  • Can files be permanently deleted or is there a way that files can be recovered? Discuss the methods of data deletion and recovery available in today’s market.
  • How secure are challenge questions for websites? Are they truly a method to secure website data or merely a way that hackers can use social engineering to find ways into websites and accounts that do not belong to them?
  • How can cybersecurity professionals prevent hacks? Is the best methodology an offensive or defensive strategy?
  • What is the true meaning of the term “cybersecurity awareness” and what does it mean to the standard individual? How can you increase cybersecurity knowledge base among non-cybersecurity individuals? Is such an endeavor even important?
  • What are security approaches to networking and infrastructure? How do they differ from securing operating systems?
  • Evaluate methods of multifactor authentication in use in today’s businesses. Perform a risk assessment for each method of authentication using the CIA triad as a baseline. Discuss how the use of multifactor authentication mediums increase or decrease the overall level of security to systems.

Capstone Essay

Now that you’ve chosen your topic for your capstone project and received approval from your instructor, it’s important to flesh out the scope of the project. Begin to consider strategies, possible threats, possible threat actors, and infrastructure as it relates to your assignment.

 

Having Trouble Meeting Your Deadline?

Get your assignment on Colorado ITS481 Access Control Lists and Two Step Authentication Essay completed on time. avoid delay and – ORDER NOW

Dot Image

Order Solution Now

Similar Posts