Information security policy – access controls, authorization, and

 Scenario: Answers the following questions to incorporate into the information needed for the PPT
Access Control & Data Protection:Ben employs a number of part time high school students interested in graphics.As you consider the components of a business continuity/recovery plan, discuss with your team the following:

  • What sort of access controls might be needed in the office?
  • How can data be protected using authentication and authorization?
  • Does this use of temporary employees create situations which makes data vulnerable to social attacks?

Main instructions for the PPTBased on your Week Four Learning Team collaborative discussion, “Access Control & Data Protection,” create a 4- to 5-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that explains the following (Sue the chapter attached as one on the refferences for the PPT):

  • The benefits of implementing access controls for Ben’s office
  • The ways you can use authorization and authentication to protect the company’s data
  • How the use of temporary employees can make data vulnerable to social engineering attacks
  • Methods to mitigate social engineering threats and damage

This media-rich presentations should include multimedia such as graphics, pictures, video clips, or audio. 

"Get Help With Your Essay
. If you need assistance with writing your essay, our professional essay writing service is here to help!

Order Now