To total this assignment, overview the instantaneous and grading rubric

To total this assignment, overview the instantaneous and grading rubric in the Module Four Activity Pointers and Rubric. It’s also possible to deserve to compile entry to the Module Four Activity Template Note Document.

  • ModuleFourActivityGuidelinesandRubric-CYB-200-13406-M01CybersecurityFoundations2024C-5Sep-Oct.pdf

  • CYB200ModuleFourActivityTemplate.pdf

CYB 200 Module Four Activity Pointers and Rubric

Overview

In this order, you’re going to develop a feature-basically basically based mostly compile entry to manage (RBAC) matrix for person compile entry to manage. RBAC matrices, as a security structure conception, are numerous represen�ng compile entry to

regulate recommendations visually. They lend a hand the prac��oner make certain that that the compile entry to manage strategy aligns with the pronounce compile entry to manage objec�ves. Matrices also lend a hand point out when compile entry to controls

could well per chance per chance additionally warfare with job roles and responsibili�es. Whenever you are comple�ng this form of process, there are a few ques�ons you ought to composed constantly be :

Who gets to log into the system?

Who gets to scrutinize what?

What assemble of recordsdata are you going through (fashioned recordsdata vs. informa�on self-discipline to privacy controls)?

Who gets as a design to add or delete? Who is scrutinize-handiest?

Who haven’t got permission?

An instance of an RBAC matrix could well per chance per chance additionally be point out in Chapter 6 of your route textbook.

Scenario

You can additionally per chance be a security analyst for a healthcare firm assigned to create an RBAC matrix for a brand recent so�ware-as-a-carrier (SaaS) applica�on for managing pa�ent medical recordsdata. There are six

participants who absorb roles one day of the system and desire varying ranges of compile entry to to the medical pa�ent so�ware. Your objec�ves are to region up the RBAC matrix to:

Be particular participants absorb compile entry to to main informa�on for his or her job feature

Withhold pa�ent privacy by adhering to the Traditional Security Invent Thought of least privilege (i.e., exchange need-to-know)

The next SaaS applica�on parameters have to be optimistic:

1. Access to pa�ent informa�on

2. Access to employee informa�on

3. Access to the SaaS

4. Access to backup logs

Glimpse the Person Job Roles and Characteris�cs table under for informa�on on the users, their roles in the organiza�on, and their job descrip�ons.

Customers Job Roles Job Characteris�cs



9/22/24, 2:21 PM Project Data

https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 1/4

https://app.readspeaker.com/cgi-bin/rsent?customerid=9568&url=https%3A%2F%2Flearn.snhu.edu%2Fcontent%2Fenforced%2F1698647-CYB-200-13406.202481-1%2FModule%2520Four%2520Activity%2520Guidelines%2520and%2520Rubric.html&lang=en_us&readid=d2l_read_element_1

Norman Remote name-middle employee

Has the flexibility to log into the medical SaaS as an employee, and has distant compile entry to to employee machines for

reason of fixing or diagnosing computer issues

Has the flexibility to create person accounts and establish passwords

Has no comely to scrutinize pa�ent informa�on

Has the flexibility to scrutinize the backup logs for most indispensable system informa�on

Ryhead Gross sales representa�ve for the healthcare

firm

Has compile entry to to the so�ware however handiest for exhibiting poten�al recent possibilities

Has the flexibility to create dummy person accounts for demo functions

Has no capability to alter any pa�ent informa�on, and could well per chance handiest point out monitors for demo functions

Has no compile entry to to the backup logs

Simone HR representa�ve for the healthcare

firm

Has the flexibility to log into the system

Has no abili�es with person accounts

Has compile entry to to the so�ware and employee records however must haven’t any compile entry to to pa�ent informa�on

Has no compile entry to to the backup logs

Janet Applica�on administrator for the SaaS

applica�on

Has plump compile entry to to so�ware, has the flexibility to trade or alter se�ngs in the system as wished, and has the flexibility

to give an override code

Has the flexibility to scrutinize, create, alter, and delete person accounts

Has no rights to trade pa�ent informa�on

Has the flexibility to scrutinize, alter, and delete backup logs for the SaaS

Dale Nurse

Has compile entry to to the system for pa�ent informa�on.

Has no abili�es with person accounts.

Has the flexibility to scrutinize, create, and alter pa�ent informa�on, however does no longer absorb the comely to delete pa�ent

informa�on with out an override code

Has no compile entry to to backup logs

9/22/24, 2:21 PM Project Data

https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 2/4

Ethan Auditor

Has the flexibility to log into the system however can handiest scrutinize informa�on

Has no abili�es with person accounts

Has no capability to create, alter, or delete pa�ent informa�on

Has the flexibility to scrutinize backup logs

Urged

Namely, you ought to take care of the cri�cal sides listed under:

I. RBAC Matrix: Populate the RBAC matrix in the Module Four Ac�vity Template utilizing one or extra of the mandatory ac�ons (scrutinize, create, alter, delete, none).

II. Essen�al Ques�ons: Resolution the next fast response ques�ons basically basically based totally on your populated table in the template:

A. What adjustments will doubtless be made to person roles through implementa�on of least privilege to be�er make stronger that security assemble precept? (Mark: Talk about with the characteris�cs in the

self-discipline table above, and clutch into myth the characteris�cs that could per chance be contradictory.)

B. What is the importance of this instrument to you as a security analyst in managing and protec�ng the ambiance? Provide an instance.

What to Submit

Submit the done RBAC matrix and fast response ques�ons in the Module Four Ac�vity Template. You can additionally post this ac�vity on your contain Microso� Note document, however your

submission must compile the an analogous sides because the template. Your submission ought to be 1–2 pages in length (plus a duvet page and references, if passe) and wri�en in APA structure. Use double

spacing, 12-point Times New Roman font, and one-hasten margins. The file name ought to composed embody the route code, assignment quantity, and your name—as an illustration,

CYB_200_Module_Four_Ac�vity_Neo_Anderson.docx.

Module Four Activity Rubric

Standards Proficient (100%) Desires Enchancment (65%) Now not Evident (0%) Value

RBAC Matrix Completes 21 or extra cells of the RBAC

matrix precisely

Completes fewer than 21 cells of the

RBAC matrix precisely

Does no longer total any of the RBAC

matrix cells precisely

65

Least Privilege Describes adjustments that could well per chance per chance additionally be made to the

person roles through implementa�on of least

privilege that is at possibility of be�er make stronger the

security assemble precept

Addresses “Proficient” standards, however there

are gaps in readability, good judgment, or detail

Does no longer take care of cri�cal component, or

response is inappropriate

15

9/22/24, 2:21 PM Project Data

https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 3/4

Standards Proficient (100%) Desires Enchancment (65%) Now not Evident (0%) Value

Importance of Instrument Explains the importance of the instrument to a

security analyst in managing and

protec�ng the ambiance, and supplies

an instance

Addresses “Proficient” standards, however there

are gaps in readability, good judgment, or detail

Does no longer take care of cri�cal component, or

response is inappropriate

15

Ar�cula�on of Response Submission has no important errors related to

cita�ons, grammar, spelling, or

organiza�on

Submission has some errors related to

cita�ons, grammar, spelling, or

organiza�on that nega�vely affect

readability and ar�cula�on of main concepts

Submission has cri�cal errors related to

cita�ons, grammar, spelling, or

organiza�on that end working out of

concepts

5

Total: 100%

9/22/24, 2:21 PM Project Data

https://be taught.snhu.edu/d2l/le/philosophize/1698647/viewContent/35102836/Uncover 4/4

,

CYB 200 Module Four Activity Template After reviewing the topic in the Module Four Activity Pointers and Rubric document, absorb in every cell with one or extra of the next actions:

• Uncover • Assemble • Adjust • Delete • None

Person name Patient recordsdata Worker recordsdata Access to the SaaS Access to backup logs

Norman

Ryhead

Simone

Janet

Dale

Ethan

After you absorb done the table above, acknowledge to the next fast questions:

1. What adjustments will doubtless be made to person roles through implementation of least privilege to raised make stronger that security assemble precept? (Mark: Talk about with the traits in the person job roles and traits table in the topic, and clutch into myth the traits that could per chance be contradictory.)

2. What is the importance of this instrument to you as a security analyst in managing and conserving the ambiance? Provide an instance.

QUALITY: 100% ORIGINAL PAPER NO ChatGPT.NO PLAGIARISMCUSTOM PAPER

Best Custom Essay Writing Services

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.

We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.

Why Choose AcademicWritersBay.com?

  • Our papers are 100% original, custom-written from scratch.
  • We’re here to support you around the clock, any day of the year.
  • You’ll find our prices competitive and reasonable.
  • We handle papers across all subjects, regardless of urgency or difficulty.
  • Need a paper urgently? We can deliver within 6 hours!
  • Relax with our on-time delivery commitment.
  • We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
  • Benefit from unlimited amendments upon request to get the paper you envisioned.
  • We pledge our dedication to meeting your expectations and achieving the grade you deserve.

Our Process: Getting started with us is as simple as can be. Here’s how to do it:

  • Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
  • Provide the specifics of your paper in the “PAPER DETAILS” section.
  • Select your academic level, the deadline, and the required number of pages.
  • Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
  • Follow the simple payment instructions and soon, our writers will be hard at work on your paper.

AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.

ORDER NOW and experience the difference with AcademicWritersBay.com, where excellence meets timely delivery.

NO PLAGIARISM