4 Responses 02/11

Actual work where 2 students given their post on this:

Work #1:

Don't use plagiarized sources. Get Your Custom Essay on
4 Responses 02/11
Just from $13/Page
Order Essay

Read three articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Use at least three sources.   Use the 

Research Databases available from the Danforth Library

, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. 

Write in essay format not in bulleted, numbered or other list format. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Work #2:

Discussion Board – Production Economics

After reading the article “Boeing’s Secret” and watching the video “How a Boeing 787 Dreamliner is Built,” discuss if you believe Boeing is labor intensive, capital intensive, or both. Has Boeing established the “network effect” for their product?

Please find the attachments.

Jacob Work:

The main objective of least privilege concept is to allow the users to gain access to database based on their needs and restriction is enabled to certain set of data which is confidential. Least privilege is a practice of restricting access rights to specific accounts, users and computing services etc and providing access to limited number of users to execute their activties. With the aid of providing least privilege services, it will ensure users will be provided with right content and there is no wastage of data and time and can reduce the chances of unnecessary risks or interruptions as several users work on database and it is difficult to arrange the services without any interruption and traffic concerns.

For instance, consider a user belonging to developing department and one needs access to computer language code and respective details providing them with other service access will complex the process and result in wastage of time and interruption to others. Restricting such access rights is referred as principle of least privilege. The principle of least privilege will enable limited services to users based on their need of the work. With the aid of least privilege concept, one can reduce the potency of risks and threats as confidential data is accessed through limited sources and management can monitor the access as least privilege is provided by management and will restrict access to sensitive data. This will also compromise the attacks from origin of the attack and restrict it from spreading it to other systems(Hammad et al., 2019).

Based on the need of the organisations most of the privileges are accessed and are role based or depend on the experience and expertise. “Implementing the POLP helps contain compromise to their area of origin, stopping them form spreading at large”

 

(Nate, 2018). The principle of least privilege has the potential to make huge impact on the database security if it is implemented successfully. The authentication and authorisation also play a crucial role in POLP and these steps will ensure that only authenticated users with authorisation will be allowed to gain access and has to follow two step verification. In this modern technological world, there are high chances of data breaches which will negatively impact the business and there are many such firms been the victims of data breaches and will pose great damage to entire business. Upon considering such aspects of data loss, it is important to maintain high level of security and necessary measurements like PLOP will ensure better security of data flow and failing to do so will face the consequences(Mendoza, 2018).

The system security is enhanced with the aid of principle of least privilege because the unknown users are not allowed to gain access and are restricted to download and install software applications which hold malware content and can pose great damage to system. This POLP will restrict the users from executing such actions and will increase the security standard. The better regulatory and compliance and data security is possible with principle of least privilege. It is also experienced that with principle of least privilege a better incident response plan is executed and change management and respective configurations are possible(Ellen., 2020).

References:

Nate. Lord. (2018, September 12). What is the Principle of Least Privilege (POLP)? A Best Practice for Information Security and Compliance. 

https://digitalguardian.com/blog/what-principle-least-privilege-polp-best-practice-information-security-and-compliance

Mendoza, M. (2018). The principle of least privilege and how it can used in cybersecurity. Retrieved from 

https://www.welivesecurity.com/2018/07/02/principle-least-privilege-strategy/

Hammad, M., Bagheri, H., & Malek, S. (2019). DelDroid: An automated approach for the determination and enforcement of least-privilege architecture in android. Journal of Systems & Software, 14(9), 83-100. DOI: 10.1016/j.jss.2018.11.049.

Ellen Neveux. (2020). 5 advantages of the principle of least privilege. Available at: https://www.securelink.com/blog/what-are-the-benefits-of-the-least-privileged-principle/.

Dushyanth Work:

Week 5 Discussion Principle of Least Privilege

            Lord (2020) argues that, “The principle of least privilege (POLP)  is the idea that at any user, program, or process should have only the bare minimum privileges necessary to perform its function.” Therefore, one need not access unauthorized data void of valid reasons. It  implies that user accounts should not be allowed to possess administrator privileges. Moreover, programmers have no right tampering with an organization’s finances (Lord, 2020). The principle has several merits to information security experts.

            The POLP ensures that users have only the enough access rights aligned with their required operations. It prevents data attacks since hackers cannot compromise low-level user accounts and access highly sensitive data (Lord, 2020). The hackers will only access data in the compromised region and fail to advance to the entire system. The author noted that, “Edward Snowden was able to leak millions of NSA files because he had admin privileges, though his highest-level task was creating database backups” (Lord, 2020). The incidence demonstrated compromise of the POLP.

            The management increased security by implementing the POLP. It ensured that 90 % of the workers could not utilize administrator privilege (Lord, 2020). The principle also assists in reducing the attack surface. In the case of Target breach, the 70 million Target customer data stolen resulted from breach of the POLP. The management allowed an HVAC contractor to upload executable which was beyond his roles (Lord, 2020). The implementation of POLP could have reduced the threat from the contractor.

            The principle also mitigates the system from malware propagation. “Malware that infects a system bolstered by the principle of least privilege is often contained to the small section where it entered first” (Lord, 2020). The malware will be detected in its area of origin before it escalates. The management should also rely on the POLP to comply with different regulations (Lord, 2020). Therefore, it avoids challenges during audits or litigation.

            Organizations have different employees who have their specific roles in data management. For instance, we have the primary administrator and email team in an organization. Svidergol (2019) argues that, “If the organization does not enforce least privileges, both the primary administrator and the email administrators might be granted administrative access to all the company’s servers, which introduces unnecessary risk.” The weakness allows primary administrators to compromise the roles of their counterparts void of accountability. It should be addressed by employing the POLP, which will limit the roles of each employee (Svidergol, 2019). The principle also reduces probability of accidental and deliberate damage.

            Organizations can address various identity risks using the POLP. The risk are separation of duty, dormant identities, privilege escalation, and toxic combinations. It is evident that, “Separation of duties (SoD) is an internal control concept commonly applied which involves the sharing of a set of responsibilities and privileges among multiple users with the intention of preventing fraud and error” (Kedrosky, 2020). SoD addresses conflict of interest and wrongful acts. It also detects control failures in security measures. The POLP ensures that all identities, either people or non-people, have distinct roles.

References

Kedrosky, E. (2020, July 10). Getting to and Maintaining the Principle of Least Privilege. Sonrai Security

Lord, N. (2020, December 1). What is the Principle of Least Privilege (POLP)? A Best Practice for Information Security and Compliance. The Digital Guardian.

Svidergol, B. (2019, April 30). What is the Principle of Least Access? Netwrix

 

Jacob Work:

Labor intensive and capital-intensive techniques are widely used by many of the organisation based on the need of their requirements of labor, capital and size of the company etc. In labor intensive technique a greater number of labor are involved and less amount of capital is invested. On the other side of capital investment wherein high capital is used and a smaller number of labor forces are required. In capital intensive case more capital is required as majority of the work is digitalised and automated which will replace labor and is practiced in railways, airline etc. whereas labor intensive technique is used by agriculture, mining and food chain sectors etc. Network effect is a situation where with the increase in customers capability to purchase a product or service will result in increased price of the product or services. Network effect is the factor which will largely favour innovation and will allow the business to make new products and services and can work on competing other business. Network effect help the business retain customers and achieve operational excellence(Holmes & France., 2002).

Aerospace manufacturing is a complex and intricate process which demand skilled workers with good experience to deal with complex parts and also aerospace manufacturing has low production volumes. Now-a-days aerospace industry has shifted to automation majorly and are using digitalised equipment in manufacturing their parts and in assembling their counterparts and product. Boeing Dreamline 787 is one of the key projects of Boeing and is fuel efficient and light weight than any other commercial airliners. Boeing Dreamliner made a good network effect for Boeing’s new product Dreamliner 787. Boeing built new facilities for making Dreamliner 787 which is more of automated services with less labor work while dealing with sensitive and intricate parts. So, Boeing is more of capital-intensive technique for producing Dreamliner 787(Elahiet al., 2014).

References:

Heese, J., Srinivasan, S., Lane, D., & Barnett, J. (2017). Accounting Turbulence at Boeing.

Holmes, S., & France, M. (2002). Boeing’s secret, BusinessWeek, accessed 25 September 2019.

Elahi, E., Sheikhzadeh, M., & Lamba, N. (2014). An integrated outsourcing framework: Analysing Boeing’s outsourcing program for Dreamliner (B787). Knowledge and Process Management, 21(1), 13-28.

Csereklyei, Z., & Stern, D. I. (2018). Flying more efficiently: joint impacts of fuel prices, capital costs and fleet size on airline fleet fuel economy (No. 1810). Centre for Climate Economics & Policy, Crawford School of Public Policy, The Australian National University.

Dushyanth Work:

Production Economics

McGuigan, Moyer, & Harris (2017) introduced the concept of production function. The function illustrates the combination of inputs yielding a given level of output. The producers require raw materials and labor to produce their commodities. They can consume both fixed and variable types of input (McGuigan et al., 2017). In the case of fixed inputs, the cost of input does not depend on the units produced.

            Chui’s (2018) video shows that Boeing company uses both labor and capital in its operations. For instance, it imports the Dreamlifter OPS’s materials from different regions. The regions include South Carolina, North Charleston, Japan, and Italy. This shows the application of capital. The assembly of the aircraft occurs in eight regions. Thus, there are supervisors and controllers to ensure efficiency in each stage. The employees form part of labor required in the firm (Chui, 2018). They also assist in wiring the aircraft, where the company requires many employees if the aircraft has to be completed fast.

            The management also require capital, in the form of machinery to transport the aircraft parts from one assembly point to the other. The machinery also undertakes some automated tasks like joinery and painting (Chui, 2018). Therefore, the company is labor and capital intensive. Production efficiency relies on the joint efforts of machines and humans (Chui, 2018). The management cannot effectively replace one form of input with the other. 

            Chui (2018) also illustrates that the management benefits from network effects. The assembly plant has eight positions, starting from zero to seven. The tasks undertaken in position zero is utilized by position one up to position seven. Therefore, the management is able to deliver value from the initial operations (Jorgenson, 2015). Alternatively, it imports assembled parts from different regions. The parts become more valuable after being incorporated into the aircraft.

References

Chui, S. (2018, April 6). How a Boeing 787 Dreamliner is Built ? YouTube Video File. Retrieved on 10th February from https://www.youtube.com/watch?v=VRfXyccWUP4

Jorgenson, E. (2015, June 22). The Power of Network Effects: Why they make such Valuable Companies, and how to Harness them. The Medium, np

McGuigan, J., Moyer, R., & Harris, F. (2017). Managerial Economics
Applications, Strategies and Tactics, 14e. Cengage Learning

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy