Identification, Authentication, and Authorization Techniques Essay

442 Words2 Pages
Identification, Authentication, and Authorization Techniques I play the role of Sam, the system administrator of Acme Distribution Center, a fictitious company. Acme is responsible for completing a huge targets of 180,000 orders. It holds the reputation of having an extremely low error rate for the central distribution per the industry standards. Therefore, Acme is viewed as a model of efficiency. Another good thing about Acme is that it operates 24X7 and even on holidays! Segregation of Duties Matrix | | (System User–Rights and Permissions) | Department | Jennifer | Buster | Bradley | Lloyd | LuEllen | Robert | Spare | Sam | Receiving | A | A | A | A | A | A | A | A | Shipping | A | A | A | A | A | A | A | A | Sales | A | A | A | A | A | A | A | A | Accounts Payable | A | A | A | A | A | A | A | A | Segregation of Duties Matrix | | (System User–Rights and Permissions) | Department | Jennifer | Buster | Bradley | Lloyd | LuEllen | Robert | Spare | Sam | Receiving | F | RO | A | F | RO | A | T | BP | Shipping | F | A | A | N | A | A | T | BP | Sales | A | N | A | F | N | N | T | BP | Accounts Payable | A | N | A | A | N | N | T | BP | After assigning the correct roles and access privileges to the users given in the scenario, answer the following questions: * What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed? The incompatible functions in Jennifer’s access account is receiving and shipping because she doesn’t deal with all the hard labor products. She just make sure the money is looking right and the sales are going up in the business and make sure the sales doesn’t fall down that it could affect the company. Her only user right and permission in Acme Distribution Center are dealing with sale and account payable and her position explained that for her. *

More about Identification, Authentication, and Authorization Techniques Essay

Open Document