Need to complete this

Assignment: Identification, Authentication, and Authorization TechniquesAssignment RequirementsThe scenario for this assignment is based on the Acme Distribution Center, a fictitious company. You need to play the role of Sam, the system administrator. Acme is responsible for completing a huge target of 180,000 orders. It holds the reputation of having an extremely low error rate for the central distribution per the industry standards. Therefore, Acme is viewed as a model of efficiency. Another good thing about Acme is that it operates 24X7 and even on holidays!At the Acme Distribution Center, your colleagues are the following employees:Robert, the lead warehouse receiverJennifer, sales and accounts payableBradley, the warehouse general managerLuEllen, the shipperBuster, the shipperLloyd, the purchasing agentSpare, for temporary helpJennifer works in the Sales Department by day and part-time as the evening accounts payable clerk with credit memo privileges to correct customer orders. Jennifer is a valuable asset for the organization. Since she joined the accounts payable department, the late payment rate has dropped by 20% while the warehouse-shipping rate increased by 10%, and the overall profit has increased by a modest amount of 0.005% for the first reporting period.Your General Manager, Bradley is concerned that there is a high-value inventory moving through the system, but the profits are, at best, meager for high margin items. Bradley discussed the issue of inventory volume with Lloyd to see if he knew of any reason for the miserable performance, since so many high-value items were being ordered and shipped.Your goal is to ensure that the users have only those access permissions that they need to perform their jobs effectively. A bit of research reveals that the warehouse has many goods to ship. You have developed the following matrix and scheme to identify conflicts in duties to address with the management. This will help Acme during the pending audit and reduce asset risk.Using the following legend, provide the users with the appropriate rights and permissions:A = Assigned to the user                                                            F = Needed for primary functionT = Temporary                                                                           N = NeverBP = By Position Assigned                                                        RO = Read OnlySegregation of Duties Matrix (System User–Rights and Permissions)DepartmentJenniferBusterBradleyLloydLuEllenRobertSpareSamReceivingAAAAAAAAShippingAAAAAAAASalesAAAAAAAAAccounts PayableAAAAAAAASegregation of Duties Matrix (System User–Rights and Permissions)DepartmentJenniferBusterBradleyLloydLuEllenRobertSpareSamReceiving        Shipping        Sales        Accounts PayableAfter assigning the correct roles and access privileges to the users given in the scenario, answer the following questions:What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?What are the requirements for Buster and LuEllen?Required ResourcesNoneBy submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.Institution Release Statement

"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support