Access Restrictions
In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment.
Write a four to five (4-5) page paper in which you:
- Identify the business you have selected.
- Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access.
- Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access.
- Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access.
- Determine the type of access levels you would provide to a contractor or consultant.
- Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
- Define authorization and access to an IT infrastructure based on an access control policy framework.
- Use technology and information resources to research issues in access control.
- Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions.
Points: 80 |
Assignment 1: Access Restrictions |
|||
Criteria |
Unacceptable Below 70% F |
Fair 70-79% C |
Proficient 80-89% B |
Exemplary 90-100% A |
1. Identify the business you have selected. Weight: 10% |
Did not submit or incompletely identified the business you have selected. |
Partially identified the business you have selected. |
Satisfactorily identified the business you have selected. |
Thoroughly identified the business you have selected. |
2. Create five (5) cases in which the no-access level should be applied within the selected business environment. Explain the reasons for no access. Weight: 20% |
Did not submit or incompletely created five (5) cases in which the no-access level should be applied within the selected business environment. Did not submit or incompletely explained the reasons for no access. |
Partially created five (5) cases in which the no-access level should be applied within the selected business environment. Partially explained the reasons for no access. |
Satisfactorily created five (5) cases in which the no-access level should be applied within the selected business environment. Satisfactorily explained the reasons for no access. |
Thoroughly created five (5) cases in which the no-access level should be applied within the selected business environment. Thoroughly explained the reasons for no access. |
3. Provide five (5) cases in which the read-access level should be applied within a business environment. Explain the reasons for read access. Weight: 20% |
Did not submit or incompletely provided five (5) cases in which the read-access level should be applied within a business environment. Did not submit or incompletely explained the reasons for read access. |
Partially provided five (5) cases in which the read-access level should be applied within a business environment. Partially explained the reasons for read access. |
Satisfactorily provided five (5) cases in which the read-access level should be applied within a business environment. Satisfactorily explained the reasons for read access. |
Thoroughly provided five (5) cases in which the read-access level should be applied within a business environment. Thoroughly explained the reasons for read access. |
4. Provide five (5) cases in which the read-write level should be applied within the selected business. Explain the reasons for read-write access. Weight: 20% |
Did not submit or incompletely provided five (5) cases in which the read-write level should be applied within the selected business. Did not submit or incompletely explained the reasons for read-write access. |
Partially provided five (5) cases in which the read-write level should be applied within the selected business. Partially explained the reasons for read-write access. |
Satisfactorily provided five (5) cases in which the read-write level should be applied within the selected business. Satisfactorily explained the reasons for read-write access. |
Thoroughly provided five (5) cases in which the read-write level should be applied within the selected business. Thoroughly explained the reasons for read-write access. |
5. Determine the type of access levels you would provide to a contractor or consultant. Weight: 15% |
Did not submit or incompletely determined the type of access levels you would provide to a contractor or consultant. |
Partially determined the type of access levels you would provide to a contractor or consultant. |
Satisfactorily determined the type of access levels you would provide to a contractor or consultant. |
Thoroughly determined the type of access levels you would provide to a contractor or consultant. |
6. 3 references Weight: 5% |
No references provided |
Does not meet the required number of references; some or all references poor quality choices. |
Meets number of required references; all references high quality choices. |
Exceeds number of required references; all references high quality choices. |
7. Clarity, writing mechanics, and formatting requirements Weight: 10% |
More than 6 errors present |
5-6 errors present |
3-4 errors present |
0-2 errors present |