CYB_200_Module_Four_Activity_Larissa_Rojas

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by DukePenguin2879

Report
4-3 Activity: Role-Based Access Control (RBAC) Matrix CYB 200 Professor Robert Brickan March 26, 2023
CYB 200 Module Four Activity Template After reviewing the scenario in the Module Four Activity Guidelines and Rubric document, fill in each cell with one or more of the following actions: View Create Modify Delete None User name Patient information Employee information Access to the SaaS Access to backup logs Norman None None View, Create, Modify, Delete View Ryhead View None View None Simone None View, Create, Modify View None Janet View None View, Create, Modify, Delete View, Modify, Delete Dale View, Create, Modify None View None Ethan View None View View After you have completed the table above, respond to the following short questions: 1. What changes could be made to user roles through implementation of least privilege to better support that security design principle? (Hint: Refer to the characteristics in the user job roles and characteristics table in the scenario, and consider the characteristics that may be contradictory.) The first change I would make is to ensure that at least 2 people at minimum have administrative privileges, because at the moment only Janet is the only one with administration rights. Having multiple users with administrative rights will make sure that all security permissions are checked and double- checked, possibly reducing the chance of human error when rights are assigned. The second change I would make is the ability to disable Ryhead's ability to preview patient information. He should be able to make a template out of the data, but he shouldn't be able to see the personal information of anyone else in case he makes a mistake and shows them data that isn't theirs. 2. What is the importance of this tool to you as a security analyst in managing and protecting the environment? Provide an example.
This tool helps to adhere to the CIA triad and demonstrates precisely who has access to what. If something goes wrong, like a breach of information or privacy, a security analyst can hold those employees accountable because they can see exactly what privileges they have. Each employee is given privileges that enable them to perform their duties, and anyone with privileges that do not specifically enable them to perform their duties should have those privileges removed to ensure the system's security.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help