Expert Answer:ISSC471 Creating Compliance Within User Domain Dis


Solved by verified expert:I need to respond to the below two students discussions with 150 words minimum for each. Below in bold are the questions the students are answering.
1. What are the functional control types? provide an example for each type.
2. What is the principle of least privilege? Why is it important to implement?

3. List and briefly discuss the User Domain Compliance Requirements.
Student one answers:
Hello Everyone,

Don't use plagiarized sources. Get Your Custom Essay on
Expert Answer:ISSC471 Creating Compliance Within User Domain Dis
Just from $10/Page
Order Essay

For this week’s forum post we are to discuss three questions given to us by out instructor. 

What are the functional control types? provide an example for each type.

First one our books states is Preventative controls: these are the basics of controls that you can see and feel.These are things like locks doors or especially locked door to a server room would be important.
Detective Controls: I think the better description with the potential environment we all maybe working in is are log analysis tools.Many employees use the organizations computers for many different things.An employee whom would work a Monday through the log analysis tools among an array of tools.
Corrective Controls: This is more of a software tool for instance a proxy server or an antivirus, so then the administration can scan the complete system to find a virus that has infiltrated security.

What is the principle of least privilege? If a user has access to a complete system, the security is ineffective.  I am using Air Force computers all the time and I do not have access to most of the folders on the shared network.  I only have access to certain folders that pertain to my unit. 
Why is it important to implement? This is important because since I have the least amount of privilege with access to folders, I cannot venture off to different folders and look at some data that is not intended for my eyes.
List and briefly discuss the User Domain Compliance Requirements.

In a nutshell known your personnel, do not break any laws, spin up your employees on practices on the system and how to handle sensitive information.
Solomon, M. G., & Weiss, M. (n.d.). Auditing IT Infrastructures for Compliance. Retrieved March 26, 2019, from…
Student two answers:
During this weeks readings I found that there are three functional control types. They include Preventive, Detective and Corrective controls. Preventive controls are put in place to stop actions. Examples of preventive controls include door locking mechanisms, computer access controls, or placing keypads to access a secured area. Preventive controls are put in place to ensure undesired actions do not occur (Weiss, 2015). Detective controls are used to recognize actions before they actions occur. Examples of detective actions include motion detectors and using logs to analyze functions (Weiss, 2015). In a way, I believe auditing can be used as an example of detective controls. Lastly, Corrective controls fix the results of an action (Weiss,2015). Examples of corrective controls would be implementing a patch management process on a network to ensure vulnerabilities are patched. It is simply an action put in place to correct a known vulnerability.   
The principle of least privilege is the practice of limiting access or rights of users on a network based solely on what is needed to perform their duties. Under the principle of least privilege, users only have read, write, r execute only on resources needed for there job. This is important to implement in a network in order to isolate the amount of damage that can be done by users. For example, the IT department should not have write or execute access to the HR department’s resources. If they did, they can delete or lose important information needed by the HR department.
Lastly, the user domain compliance requirements I will discuss include Need to Knows and confidentiality agreements. Need to know is implemented to ensure users have access to data that they are authorized to access (Weiss, 2015). This way not every user can gain access to classified data.  Confidentiality agreements provide a company a legal support. It ensures its user abide and can be held legally accountable in case of a security incident.
Weiss, Martin & Solomon, Michael G. (2015). Auditing IT Infrastructures For Compliance. Second Edition.Jones & Bartlett Learning: Information Systems Security & AssuranceCurriculum. ISBN: 1284090701 978-1284090703
-Jason B

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code ESSAYSHELP