Activity 9.6: Identifying Security Models

In this activity, you will first identify the optimal security model or method to use in a given situation. Next, you will analyze the security model or method selection in a scenario. Microsoft Official Curriculum (MOC), available to IT Academies at a discounted price, is professional courseware intended for IT professionals and developers who build, support, and implement solutions by using Microsoft products and technologies. MOC is designed to cover the topics that employers know are mission-critical in the real world. . | Activity Identifying Security Models In this activity you will first identify the optimal security model or method to use in a given situation. Next you will analyze the security model or method selection in a scenario. Objectives After completing this activity you will be able to Identify the appropriate security models and methods for a given set of requirements and constraints. Before You Begin This activity includes both small group tasks and class discussion. Prerequisites There are no prerequisites for this activity. Materials There are no materials for this activity. Time to complete this activity 15 minutes followed by a 10 minute discussion. 82 Activity Identifying Security Models Exercise 1 Identifying a Security Method for a Scenario 10 minutes Identify the security requirements 1. Participate in small groups as assigned by the instructor. 2. Read each scenario below. 3. Identify which security method meets the needs of the scenario. 4. Write your answers below. After completing the above steps you will discuss your responses with the class. The instructor will write the class consensus on a flip chart. Scenarios A A large manufacturing company has a set of applications running with Microsoft SQL Server back ends and custom-developed middle-tier objects. Users are required to log in each morning to check e-mail. B A Web application with a set of public users who are each allowed to configure their own settings. Solution A B Activity Identifying Security Models 83 Exercise 2 Analyzing Technology Selection 5 minutes Analyze technology selection 1. Participate in small groups as assigned by the instructor. 2. Read the scenario below. 3. Validate the feasibility of the solution given in the scenario. 4. Make any comments in the space below. 5. The instructor will discuss answers after the activity is complete. After completing the above steps you will discuss your responses with the class. The instructor will write the class consensus on a flip .

Bấm vào đây để xem trước nội dung
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.