Search for question
Question

Southern New Hampshire University

CYB 200 Module Four Activity Template

After reviewing the scenario in the Module Four Activity Guidelines and Rubric document, fill in each cell with one or more of the following actions:

View

Create

Modify

Delete

None

User name

Norman

Ryhead

Simone

Janet

Dale

Ethan

Patient information

Employee information

Access to the SaaS

Access to backup logs

After you have completed the table above, respond to the following short questions:

1. What changes could be made to user roles through implementation of least privilege to better support that security design principle? (Hint: Refer to th

characteristics in the user job roles and characteristics table in the scenario, and consider the characteristics that may be contradictory.)

Writo Comment horo

2. What is the importance of this tool to you as a security analyst in managing and protecting the environment? Provide an example.

Fig: 1