Question: Access control systems are constantly under surveillance and attack. An attacker who gains control of an access control system can leverage that access to

Access control systems are constantly under surveillance and attack. An attacker who gains control of an

Access control systems are constantly under surveillance and attack. An attacker who gains control of an access control system can leverage that access to gain entry to other systems in the enterprise. Frequent testing of access control systems ensures that weaknesses are found and can be dealt with before they are exploited. Network monitoring is a critical IT process where all networking components, such as routers, switches, firewalls, and servers, are monitored for faults, performance, and anomalies in order to detect possible intruders or attacks. Tasks Create a two-part report to the CIO that addresses the following A high-level plan for testing RBAC and physical security (building access) Include type of tests to be performed and frequency A high-level plan for on-going network monitoring to ensure the RBAC solution is working properly Network monitoring to be performed at each Big Tire location . Access control systems are constantly under surveillance and attack. An attacker who gains control of an access control system can leverage that access to gain entry to other systems in the enterprise. Frequent testing of access control systems ensures that weaknesses are found and can be dealt with before they are exploited. Network monitoring is a critical IT process where all networking components, such as routers, switches, firewalls, and servers, are monitored for faults, performance, and anomalies in order to detect possible intruders or attacks. Tasks Create a two-part report to the CIO that addresses the following A high-level plan for testing RBAC and physical security (building access) Include type of tests to be performed and frequency A high-level plan for on-going network monitoring to ensure the RBAC solution is working properly Network monitoring to be performed at each Big Tire location .

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Part 1 HighLevel Plan for Testing RBAC and Physical Security Building Access Objective To ensure the integrity and effectiveness of RBAC and physical security systems in protecting against unauthorize... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!