Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Identity Management

  • A business journal has approached you to educate its readers about identity management strategies and issues. Assume that your audience includes key business stakeholders who may not have deep IT background. They need to understand these important issues and potential solutions so that they can communicate and collaborate effectively with IT technical staff to make appropriate decisions in their organizations.Develop a 6–8-page analysis of the following key issues related to identity management and the role it plays in an effective security management program:
    • Describe the primary components that exist in an effective identity management program.
    • Describe the characteristics of commonly used access control models.
    • Describe the components of a public key infrastructure architecture.
    • Describe potential challenges organizations face that are specific to key generation, storage, and distribution.
    • Specify which identity management risks are mitigated through the use of common encryption solutions.
    • Analyze factors that determine the appropriate method of authentication to an enterprise network.

    Note: The bullet points above outline the topics that are to be addressed in this assessment, and the scoring rubric informs the level of detail required at each of the competency levels covered in the rubric.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
    • Page length: 6–8 double-spaced pages, not including the references page.
    • Font and font size: Times New Roman, 12 point.
Criteria Non-performance Basic Proficient Distinguished
Describe the primary components that exist in an effective identity management program.
Does not describe the primary components that exist in an effective identity management program. Describes incompletely or inaccurately the primary components that exist in an effective identity management program. Describes the primary components that exist in an effective identity management program. Describes the primary components that exist in an effective identity management program, including the use of supporting examples.
Describe the characteristics of commonly used access control models.
Does not describe the characteristics of commonly used access control models. Describes incompletely or inaccurately the characteristics of commonly used access control models. Describes the characteristics of commonly used access control models. Describes the characteristics of commonly used access control models, including the use of supporting examples.
Describe the components of a public key infrastructure architecture.
Does not describe the components of a public key infrastructure architecture. Describes incompletely or inaccurately the components of a public key infrastructure architecture. Describes the components of a public key infrastructure architecture. Describes the components of a public key infrastructure architecture, including the use of supporting examples.
Describe potential challenges organizations face that are specific to key generation, storage, and distribution
Does not describe potential challenges organizations face that are specific to key generation, storage, and distribution. Describes incompletely or inaccurately potential challenges organizations face that are specific to key generation, storage, and distribution. Describes potential challenges organizations face that are specific to key generation, storage, and distribution. Describes potential challenges organizations face that are specific to key generation, storage, and distribution, including the use of supporting examples.
Specify which identity management risks are mitigated through the use of common encryption solutions.
Does not specify which identity management risks are mitigated through the use of common encryption solutions. Specifies incompletely or inaccurately which identity management risks are mitigated through the use of common encryption solutions. Specifies which identity management risks are mitigated through the use of common encryption solutions. Specifies which identity management risks are mitigated through the use of common encryption solutions, including the use of supporting examples.
Analyze factors that determine the appropriate method of authentication to an enterprise network.
Does not analyze factors that determine the appropriate method of authentication to an enterprise network. Analyzes incompletely or inaccurately factors that determine the appropriate method of authentication to an enterprise network. Analyzes factors that determine the appropriate method of authentication to an enterprise network. Analyzes factors that determine the appropriate method of authentication to an enterprise network, including the use of supporting examples.
Exhibit proficiency in writing and use of APA 6th edition.
Does not exhibit proficiency in writing and use of APA 6th edition. Exhibits a low level of proficiency in writing and use of APA 6th edition. Exhibits proficiency in writing and use of APA 6th edition. Exhibits a high level of proficiency in writing and use of APA 6th edition.
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *