Foundations in Cybersecurity Management
Project 2: Authentication, Authorization, and Access Control
Step 12: Develop the Implementation Guidance Presentation
In response to the request from the CTO and VP of HR, you will develop a presentation for HR management which discusses how to limit access to specific types of data and protect vulnerable data from outside threats. You will explain the lineage of data, data ownership, and data-access related authentication, authorization, and access control. You will also take this opportunity to educate on the basic principles of data/network access control and to advocate for stronger access controls.
You will develop an 18- to 20-slide presentation that clearly explains the principles of authentication, authorization, and access control, examines various models, and recommends a strategy for the organization. You will use the information that you have gathered in the initial steps of this project. Make sure to include the following:
- Describe authentication, authorization, and access control as an important security concept.
- Evaluate the different models and examples of authentication, authorization, and access control.
- Make the case for changes to the organization’s authentication, authorization, and access control policies/systems.
- Present the recommended strategy.
- Discuss how you will evaluate the effectiveness of the security program.
Submit the presentation in the last step.
"96% of our customers have reported a 90% and above score. You might want to place an order with us."
