Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
It is crucial to study the structural behavior within organization so that the effectiveness of the organization can be improved. (Robbins & Judge, 2013) The employer needs to be aware of the duties and tasks within the organization so they can be managed in a proper way. Along with managing tasks and maintaining the work output, special care needs to be given to the security measures within the company. In the competitive world today, organizations are making using of the smallest information they can attain from their rival companies. Just recently, separation of duty and role based access control (RBAC) were discovered as the new mechanisms to improve the security measures within an organization.
Separation of Duties
Separation of duties is very important when it comes to keeping control. It appears that separation of duties is difficult and sometimes very difficult to manage. The main task is attained by dividing all the tasks and privileges among different people. (Coleman, 2008) Separation of duty is a security model utilized to formulate multi-person control policies. The major aim here is that two or more persons are selected for the completion of a certain task. The purpose behind this act is to reduce the incidence of fraud and cheating within the organization. In this way, there are more than one persons involved and the responsibility and authority of the act is spread over more than one person. (Simon & Zurko,1997) It should be noted that the idea of separation of duty must include the principle of user-centered security. (Simon & Zurko, 1996) Separation of duties also makes sure that critical decision making power does not reside with only one person within the organization.
Using roles to segregate data
This entire idea of separation of duties and division of roles started off when important government agencies required top notch protection. It appears that many civilian and commercial governed organizations have picked up these policies. Like Department of Defense agencies, commercial firms also wish to protect the confidentiality of their information. For instance, an organization needs to protect its marketing plans, product announcements, formulas, personnel data, manufacturing and development techniques. Nonetheless, these organizations are very much concerned with their integrity (Clark and Wilson,1987)
We see that within these organizations, integrity actually overlaps between confidentiality and security. Integrity becomes very crucial in deciding matters such as fund transfers. Direct access control is a mechanism that allows some users to be exposed to certain information and disallows other users from viewing that information.
This entire method is based on the identity of certain individuals and to the groups they belong to. This means that the controls are not discretionary and the person is prohibited from passing that information to any other person in the system. It should be noted that within many organizations, the users do not actually own the information to which they are allowed access to. In simple terms, these individuals are merely responsible for that information. Thus it should be noted that the organization actually owns the information (Ferraiolo & Kuhn, 1992)
Role-based access control (RBAC)
A role based access control (RBAC) policy establishes access control decisions on the duties and functions an individual has within the organization. This means that the users cannot give access permission to other users at their discretion. It should be noted that the RBAC method would simplify the management of permissions. To simplify this, the major aim here is to link permissions with roles. After doing that, certain users or user groups are made members or certain roles within the organization (S and Hu et al., 1996) A role basically represents a person's ability to carry out a certain task. This can also mean a responsibility or an authority within the organization.
A study carried out by NIST (Ferraiolo and Gilbert et al., 1995) states that RBAC goes on to satisfy many needs of the government and commercial sectors. This study showed that many organizations base their control decisions depending on the roles that the users have in the organization. If one looks at it in simpler terms, it is basically a system of checks and balances so that one person does not become very powerful in the company. It is…[continue]
"User Access It Is Crucial To Study" (2013, September 14) Retrieved October 24, 2016, from http://www.paperdue.com/essay/user-access-it-is-crucial-to-tudy-96307
"User Access It Is Crucial To Study" 14 September 2013. Web.24 October. 2016. <http://www.paperdue.com/essay/user-access-it-is-crucial-to-tudy-96307>
"User Access It Is Crucial To Study", 14 September 2013, Accessed.24 October. 2016, http://www.paperdue.com/essay/user-access-it-is-crucial-to-tudy-96307
In fact, an incoherent approach to it can lead to negative effects such as escalation of costs and lowering of efficiencies. It portfolio management addresses this key issue right from the conceptual stage of projects. The portfolio approach ensures that it projects are implemented with shared commitment, within the statutory framework. Some of the important measures implemented are: Collaborative decision making for key and large scale projects Stakeholder commitment and support
Secured real time protocol (SRTP) is also being identified to enhance the security parameter of WAN and LAN network elements. "SRTP provides protection with encryption keys for wired and wireless networks including bandwidth limited channels." (Guillen and Chacon 2009 P. 690). There is also a growing use of IP secure to protect organization from the interception of data over the LAN and WAN environment. To enhance network security, Chen, Horng,
A survey questionnaire design is employed to gather data to be used in the lazy user model test, with details on the sample population in which the questionnaire is to be administered. An innovative method to increase response rate is offered, followed by a data analysis plan. Finally, a conclusion and recommendation will complete this research project. 2. Literature Review 2.1 Information Technology and the Internet The Information Age has changed our
United States is in the middle of a war on drugs, and has been for several decades. Yet, many believe that we are losing this war, often because of the impractical approach legislation has taken in response to curb growing rates of addiction in the United States; however, drug addiction continues to be a major social problem in the United States. Research shows that there is a direct correlation
Branding in the global marketplace "Brands should be viewed as markers in a global system of symbolic differences" (Cayla, 2008, p. 106). Julien Cayla and Eric. J. Arnould assert in their Abstract that scholars in the field of international marketing need to "revise some key premises and foundations" and think more along the lines of the being "culturally relative" and "contextually sensitive" when approaching global branding (Cayla, et al., 2008, p.
Human resources The first person employed by the company was Chris Agarpao and the first president hired was Jeff Skoll, in 1996. Ebay employs individuals with a large variety of skills, from technical to customer service. The number is increasing fast reaching 5 digits in 2005 and having a double digit growth. Considering that it is desirable to work for such a successful company, the personnel inflows are likely to be high and
Academic Profile of Home Schooling - a Case Study Home Schooling vs. Traditional Educational Methods Home Schooling Methodology Focus of the Practicum Culture Area of Inquiry Subject/Topic Areas Home Schooling as an Alternative Curricula and Materials Used for Home Schooling The Success of Home Schooling Evaluation Design Conditions for Change Timeline Chronology Legislative Information: Maryland: A Legal Analysis State Laws and Regulations - Maryland Goulart and Travers vs. Calvert County Home-schooled Kids Find Social Growth" Home Schoolers in the Trenches" Home School Academic Advantage Increases Over Time" Home Schooling." ERIC Digest,