Assignment: Identification, Authentication, and Authorization Techniques
1. Requirements
The scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role of Sam, the system administrator. Acme is responsible for completing a huge target of 180,000 orders. It holds the reputation of having an extremely low error rate for the central distribution per the industry standards. Therefore, Acme is viewed as a model of efficiency. Another good thing about Acme is that it operates 24X7 and even on holidays!
At the Acme Distribution Center, your colleagues are the following employees:
o Robert, the lead warehouse receiver
o Jennifer, sales and accounts payable
o Bradley, the warehouse general manager
o LuEllen, the shipper
o Buster, the shipper
o Lloyd, the purchasing agent
o Spare, for temporary help
o Jennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20% while the warehouse-shipping rate increased by 10%, and the overall profit has increased by a modest amount of 0.005% for the first reporting period.
Your General Manager, Bradley is concerned that there is a high-value inventory moving through the system, but the profits are, at best, meager for high margin items. Bradley discussed the issue of inventory volume with Lloyd to see if he knew of any reason for the miserable performance, since so many high-value items were being ordered and shipped.
Your goal is to ensure that the users have only those access permissions that they need to perform their jobs effectively. A bit of research reveals that the warehouse has many goods to ship. You have developed the following matrix and scheme to identify conflicts in duties to address with the management. This will help Acme during the pending audit and reduce asset risk.
Using the following legend, provide the users with the appropriate rights and permissions:
A = Assigned to the user F = Needed for primary function
T = Temporary N = Never
BP = By Position Assigned RO = Read Only
Segregation of Duties Matrix (System User-Rights and Permissions) Department Jennifer Buster Bradley Lloyd Lu Ellen Robert Spare Sam Receiving AAAAAAAA Shipping AAAAAAAA Sales AAAAAAAA Accounts Payable AAAAAAAA.
Segregation of Duties Matrix (System User-Rights and Permissions)DepartmentJenniferBusterBradleyLloydLuEllenRobertSpareSamReceiving Shipping Sales Accounts Payable
After assigning the correct roles and access privileges to the users given in the scenario, answer the following questions:
o What were the incompatible functions in Jennifer's access account, and why do you think such an incompatibility existed?
o What were the potential conflicts and incompatible functions in Lloyd's access account authorizations?
o What are the requirements for Buster and LuEllen?
o Required Resources
None
2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
Format your assignment according to the following formatting requirements:
1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.
3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.