Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Authorization Techniques

  1. Assignment: Identification, Authentication, and Authorization Techniques

    Assignment Requirements
    The scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role of Sam, the system administrator. Acme is responsible for completing a huge target of 180,000 orders. It holds the reputation of having an extremely low error rate for the central distribution per the industry standards. Therefore, Acme is viewed as a model of efficiency. Another good thing about Acme is that it operates 24X7 and even on holidays!

    At the Acme Distribution Center, your colleagues are the following employees:

    • Robert, the lead warehouse receiver
    • Jennifer, sales and accounts payable
    • Bradley, the warehouse general manager
    • LuEllen, the shipper
    • Buster, the shipper
    • Lloyd, the purchasing agent
    • Spare, for temporary help
    • Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20% while the warehouse-shipping rate increased by 10%, and the overall profit has increased by a modest amount of 0.005% for the first reporting period.

      Your General Manager, Bradley is concerned that there is a high-value inventory moving through the system, but the profits are, at best, meager for high margin items. Bradley discussed the issue of inventory volume with Lloyd to see if he knew of any reason for the miserable performance, since so many high-value items were being ordered and shipped.

      Your goal is to ensure that the users have only those access permissions that they need to perform their jobs effectively. A bit of research reveals that the warehouse has many goods to ship. You have developed the following matrix and scheme to identify conflicts in duties to address with the management. This will help Acme during the pending audit and reduce asset risk.

      Using the following legend, provide the users with the appropriate rights and permissions:
      A = Assigned to the user                                                            F = Needed for primary function
      T = Temporary                                                                           N = Never
      BP = By Position Assigned                                                        RO = Read Only

      Segregation of Duties Matrix (System User–Rights and Permissions)DepartmentJenniferBusterBradleyLloydLuEllenRobertSpareSamReceivingAAAAAAAAShippingAAAAAAAASalesAAAAAAAAAccounts PayableAAAAAAAA
      Segregation of Duties Matrix (System User–Rights and Permissions)DepartmentJenniferBusterBradleyLloydLuEllenRobertSpareSamReceiving        Shipping        Sales        Accounts Payable
      After assigning the correct roles and access privileges to the users given in the scenario, answer the following questions:

    • What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
    • What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
    • What are the requirements for Buster and LuEllen?
    • Required Resources
      None
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
  3. Institution Release Statement

 

“Is this question part of your assignment? We Can Help!”


Authorization Techniques was first posted on August 30, 2019 at 3:52 am.
©2019 "Classroom Essays". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at Academicheroes.com

Source link

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”


Authorization Techniques was first posted on August 30, 2019 at 3:53 am.
©2019 "Academicheroes.com". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at admin@Academicheroes.com.com

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"