Chat with us, powered by LiveChat CIS310 Case Study 2-Technology & Product Review for Identity Governance & Administration | acewriters

Case Scenario:See the Sifers-Grayson company profile.The Red Team from Nofsinger Consulting Services has had its first successful penetration of the Sifers-Grayson Enterprise. Here is a snippet from the team leader’s report at this morning’s client briefing.The Nofsinger Red Team conducted a penetration test two days ago and was able to gain access to the engineering center’s R&D servers using a login and password obtained through a keylogger on a USB key left in one of the company’s break rooms.The Red Team copied files from the R&D servers to an external hard drive. A review with the company’s Chief Operating Officer confirmed that the Red Team managed to steal 100% of the design documents and source code for the AX10 Drone System.Research:1. Review the weekly readings2. Choose an Identity Management or Identity Governance & Administration product which was mentioned in the readings. Research your chosen product using the vendor’s website and product information brochures.3. Find three or more additional sources which provide reviews for (a) your chosen product or (b) general information about the characteristics of Identity Governance & Administration. Products.Write:Write a 3 page summary of your research. At a minimum, your summary must include the following:1. An introduction or overview for the security technology category (Identity Governance & Administration).2. A review of the features, capabilities, and deficiencies for your selected vendor and product.3. Discussion of how the selected product could be used by your client to support its cybersecurity objectives by reducing risk, increasing resistance to threats/attacks, decreasing vulnerabilities, etc.As you write your review, make sure that you address security issues using standard cybersecurity terminology (e.g. 5 Pillars IA, 5 Pillars Information Security, “governance,” etc.). See the resources listed under Week 1 and under Course Resources > Cybersecurity Concepts Review for definitions and terminology.Formatting InstructionsUse standard APA formatting for the MS Word document that you submit to your assignment folder. Formatting requirements and examples are found under Course Resources > APA Resources.Submit For GradingSubmit your case study in MS Word format (.docx or .doc file) using the Case Study #2:IGA Technology & Product Review assignment in your assignment folder. (Attach the file.)Additional Information1. There is no penalty for writing more than 3 pages but, clarity and conciseness are valued. If your essay is shorter than 3 pages, you may not have sufficient content to meet the assignment requirements (see the rubric).2. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 3. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.

error: Content is protected !!