Authentication and Authorization Methodologies
Buy the answer at $5 only
- Once a user is authenticated in an organization’s network, that user is authorized to access certain data based on the information security principle of least privilege.
Your CEO and CIO need options for the organization’s authentication and authorization methodologies. Recommendations should include how to mitigate the impact and risks from vulnerabilities.
Create an 9- to 11-slide, media-rich presentation in Microsoft® PowerPoint® for the organization you chose in Week 1. Your audience is the CEO and the CIO, so the presentation must be professional and targeted at an executive audience. Include speaker notes to show what points you are covering during the presentation. Ensure you provide:
- Descriptions of at least 3 roles employed in the organization you chose in Week 1
- Descriptions of at least 3 common attacks against access control methods, including the password policy vulnerability as described in the vulnerability report
- Countermeasures to reduce vulnerabilities and mitigate potential attacks on access control methods
- Note: A media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.
Format your all references and citations according to APA guidelines. Given that this is an academic assignment, additional research outside of the class materials to support the assertions in the document is expected.
Submit your assignment in Microsoft PowerPoint format.
- My organization is a bank. Information must be specific to the banking industry
Do you need high quality Custom Essay Writing Services?