To full this project, review the rapid and grading rubric in the Module Four Job Pointers and Rubric. You’re going to also prefer to collect entry to the Module Four Job Template Note Document.
-
ModuleFourActivityGuidelinesandRubric-CYB-200-13406-M01CybersecurityFoundations2024C-5Sep-Oct.pdf
-
CYB200ModuleFourActivityTemplate.pdf
CYB 200 Module Four Job Pointers and Rubric
Overview
On this divulge, you would possibly perhaps originate a feature-primarily based fully mostly gather entry to take care of a watch on (RBAC) matrix for consumer gather entry to take care of a watch on. RBAC matrices, as a security structure concept, are a strategy of represen�ng gather entry to
take care of a watch on ideas visually. They support the prac��oner be clear that the gather entry to take care of a watch on technique aligns with the particular gather entry to take care of a watch on objec�ves. Matrices also support indicate when gather entry to controls
can also war with job roles and responsibili�es. Whereas you would possibly perhaps presumably also very successfully be comple�ng this form of job, there are about a ques�ons it is most sensible to amassed always be hooked in to:
Who gets to log into the system?
Who gets to detect what?
What extra or much less knowledge are you going by (total knowledge vs. informa�on discipline to privateness controls)?
Who gets to add or delete? Who is detect-simplest?
Who place no longer possess permission?
An example of an RBAC matrix can be listing in Chapter 6 of your route textbook.
Scenario
You would possibly want to presumably also very successfully be a security analyst for a healthcare agency assigned to manufacture an RBAC matrix for a original so�ware-as-a-carrier (SaaS) applica�on for managing pa�ent clinical info. There are six
other folks who possess roles inside of the system and desire moderately about a phases of gather entry to to the clinical pa�ent so�ware. Your objec�ves are to situation up the RBAC matrix to:
Kind clear other folks possess gather entry to to mandatory informa�on for his or her job feature
Withhold pa�ent privateness by adhering to the Elementary Security Make Precept of least privilege (i.e., change need-to-know)
The following SaaS applica�on parameters must amassed be determined:
1. Accumulate admission to to pa�ent informa�on
2. Accumulate admission to to employee informa�on
3. Accumulate admission to to the SaaS
4. Accumulate admission to to backup logs
Scrutinize the Person Job Roles and Characteris�cs table under for informa�on on the customers, their roles in the organiza�on, and their job descrip�ons.
Customers Job Roles Job Characteris�cs
9/22/24, 2:21 PM Project Files
https://be taught.snhu.edu/d2l/le/notify/1698647/viewContent/35102836/Be conscious 1/4
Norman Distant name-center employee
Has the capability to log into the clinical SaaS as an employee, and has distant gather entry to to employee machines for
cause of fixing or diagnosing computer points
Has the capability to manufacture consumer accounts and attach passwords
Has no correct to detect pa�ent informa�on
Has the capability to detect the backup logs for vital system informa�on
Ryhead Gross sales representa�ve for the healthcare
agency
Has gather entry to to the so�ware but simplest for exhibiting poten�al original possibilities
Has the capability to manufacture dummy consumer accounts for demo functions
Has no capability to change any pa�ent informa�on, and can simplest indicate shows for demo functions
Has no gather entry to to the backup logs
Simone HR representa�ve for the healthcare
agency
Has the capability to log into the system
Has no abili�es with consumer accounts
Has gather entry to to the so�ware and employee records but must don’t possess any gather entry to to pa�ent informa�on
Has no gather entry to to the backup logs
Janet Applica�on administrator for the SaaS
applica�on
Has rotund gather entry to to so�ware, has the capability to interchange or regulate se�ngs in the system as wanted, and has the capability
to fabricate an override code
Has the capability to detect, manufacture, regulate, and delete consumer accounts
Has no rights to interchange pa�ent informa�on
Has the capability to detect, regulate, and delete backup logs for the SaaS
Dale Nurse
Has gather entry to to the system for pa�ent informa�on.
Has no abili�es with consumer accounts.
Has the capability to detect, manufacture, and regulate pa�ent informa�on, but does now not possess the fitting to delete pa�ent
informa�on without an override code
Has no gather entry to to backup logs
9/22/24, 2:21 PM Project Files
https://be taught.snhu.edu/d2l/le/notify/1698647/viewContent/35102836/Be conscious 2/4
Ethan Auditor
Has the capability to log into the system but can simplest detect informa�on
Has no abili�es with consumer accounts
Has no capability to manufacture, regulate, or delete pa�ent informa�on
Has the capability to detect backup logs
Recommended
Particularly, you’d like to tackle the cri�cal facets listed under:
I. RBAC Matrix: Populate the RBAC matrix in the Module Four Ac�vity Template the usage of one or extra of the desired ac�ons (detect, manufacture, regulate, delete, none).
II. Essen�al Ques�ons: Acknowledge the following short response ques�ons in step in conjunction with your populated table in the template:
A. What adjustments would possibly perhaps presumably be made to consumer roles by implementa�on of least privilege to be�er back that security develop precept? (Hint: Discuss over with the characteris�cs in the
discipline table above, and examine the characteris�cs that can presumably be contradictory.)
B. What’s the importance of this tool to you as a security analyst in managing and protec�ng the surroundings? Present an example.
What to Put up
Put up the accomplished RBAC matrix and short response ques�ons in the Module Four Ac�vity Template. You would possibly want to presumably also furthermore post this ac�vity on your possess Microso� Note document, but your
submission must have the same facets because the template. Your submission desires to be 1–2 pages in dimension (plus a screen page and references, if dilapidated) and wri�en in APA layout. Exercise double
spacing, 12-level Conditions Fresh Roman font, and one-slither margins. The file title must amassed consist of the route code, project number, and your title—to illustrate,
CYB_200_Module_Four_Ac�vity_Neo_Anderson.docx.
Module Four Job Rubric
Requirements Proficient (100%) Desires Enchancment (65%) No longer Evident (0%) Payment
RBAC Matrix Completes 21 or extra cells of the RBAC
matrix accurately
Completes fewer than 21 cells of the
RBAC matrix accurately
Would now not full any of the RBAC
matrix cells accurately
65
Least Privilege Describes adjustments that can be made to the
consumer roles by implementa�on of least
privilege that can presumably be�er back the
security develop precept
Addresses “Proficient” criteria, but there
are gaps in readability, logic, or ingredient
Would now not tackle cri�cal ingredient, or
response is inappropriate
15
9/22/24, 2:21 PM Project Files
https://be taught.snhu.edu/d2l/le/notify/1698647/viewContent/35102836/Be conscious 3/4
Requirements Proficient (100%) Desires Enchancment (65%) No longer Evident (0%) Payment
Importance of Instrument Explains the importance of the tool to a
security analyst in managing and
protec�ng the surroundings, and offers
an example
Addresses “Proficient” criteria, but there
are gaps in readability, logic, or ingredient
Would now not tackle cri�cal ingredient, or
response is inappropriate
15
Ar�cula�on of Response Submission has no vital errors associated to
cita�ons, grammar, spelling, or
organiza�on
Submission has some errors associated to
cita�ons, grammar, spelling, or
organiza�on that nega�vely impact
readability and ar�cula�on of vital ideas
Submission has cri�cal errors associated to
cita�ons, grammar, spelling, or
organiza�on that quit working out of
ideas
5
Total: 100%
9/22/24, 2:21 PM Project Files
https://be taught.snhu.edu/d2l/le/notify/1698647/viewContent/35102836/Be conscious 4/4
,
CYB 200 Module Four Job Template After reviewing the topic in the Module Four Job Pointers and Rubric document, hold in every cell with one or extra of the following actions:
• Be conscious • Make • Modify • Delete • None
Person title Patient knowledge Employee knowledge Accumulate admission to to the SaaS Accumulate admission to to backup logs
Norman
Ryhead
Simone
Janet
Dale
Ethan
After you would possibly perhaps presumably even possess accomplished the table above, retort to the following short questions:
1. What adjustments would possibly perhaps presumably be made to consumer roles by implementation of least privilege to greater back that security develop precept? (Hint: Discuss over with the characteristics in the patron job roles and characteristics table in the topic, and examine the characteristics that can presumably be contradictory.)
2. What’s the importance of this tool to you as a security analyst in managing and conserving the surroundings? Present an example.
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO ChatGPT.NO PLAGIARISM – CUSTOM PAPER

Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.
We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.
Why Choose AcademicWritersBay.com?
- Our papers are 100% original, custom-written from scratch.
- We’re here to support you around the clock, any day of the year.
- You’ll find our prices competitive and reasonable.
- We handle papers across all subjects, regardless of urgency or difficulty.
- Need a paper urgently? We can deliver within 6 hours!
- Relax with our on-time delivery commitment.
- We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
- Benefit from unlimited amendments upon request to get the paper you envisioned.
- We pledge our dedication to meeting your expectations and achieving the grade you deserve.
Our Process: Getting started with us is as simple as can be. Here’s how to do it:
- Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
- Provide the specifics of your paper in the “PAPER DETAILS” section.
- Select your academic level, the deadline, and the required number of pages.
- Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
- Follow the simple payment instructions and soon, our writers will be hard at work on your paper.
AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.
