CYB 200 Module Four Activity Template
After reviewing the scenario in the Module Four Activity Guidelines and Rubric document, fill in each cell with one or more of the following actions:
View
Create
Modify
Delete
None
User name
Norman
Ryhead
Simone
Janet
Dale
Ethan
Patient information
Employee information
Access to the SaaS
Access to backup logs
After you have completed the table above, respond to the following short questions:
1. What changes could be made to user roles through implementation of least privilege to better support that security design principle? (Hint: Refer to th
characteristics in the user job roles and characteristics table in the scenario, and consider the characteristics that may be contradictory.)
Writo Comment horo
2. What is the importance of this tool to you as a security analyst in managing and protecting the environment? Provide an example.
Fig: 1