Cmgt 430 Week 3 Using Roles

1065 Words5 Pages
Week 3 Assignment: Using Roles Lane Carey CMGT/430 October 21, 2013 Instructor: Stephen Jones Controlling access to sensitive information is an important part of the risk management strategy for McBride Financial services. Knowing who should have access to sensitive information may seem like a straight-forward decision; but knowing how to control access can be difficult. Access controls help maintain the confidentiality, integrity, and availability of information. When protecting information across the organization, separating duties and defining roles will assist the determination of data and system access needs of individuals in the organization. A role-based access control system is the best way to set and maintain the access needs for the organization. Separating duties within the organization has many benefits that can aid the security of information within the organization. Conflicts of interest and restriction of power are controlled by separating duties. When job duties are divided among individuals, a barrier is put in place to prevent fraud by one person within the organization. An information flow diagram can be used to help the organization determine each function; and assign the appropriate person to do the work. For example, sales agents may create an order to do a home inspection, but an accounts receivable associate will be the person collecting payment from the homeowner and paying the home inspector. This would create a situation in which no one person controls the entire transaction; and the organization can use a tracking system that follows the order process trail. Separation of duties can be further supported through examining IT roles within the organization. Once systems are configured within the organization, only the database administrator could add or remove programs to the system. System updates

More about Cmgt 430 Week 3 Using Roles

Open Document