Tải bản đầy đủ (.pdf) (4 trang)

Tài liệu Activity 9.6: Identifying Security Models docx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (91.25 KB, 4 trang )


Activity 9.6: Identifying Security
Models
In this activity, you will first identify the optimal security model or method to
use in a given situation. Next, you will analyze the security model or method
selection in a scenario.
Objectives
After completing this activity, you will be able to:
!
Identify the appropriate security models and methods for a given set of
requirements and constraints.

Before You Begin
This activity includes both small group tasks and class discussion.
Prerequisites
There are no prerequisites for this activity.
Materials
There are no materials for this activity.
Time to complete this activity: 15 minutes followed by a 10 minute
discussion.
82 Activity 9.6: Identifying Security Models



Exercise 1: Identifying a Security Method for a Scenario (10
minutes)
!
Identify the security requirements
1. Participate in small groups as assigned by the instructor.
2. Read each scenario below.
3. Identify which security method meets the needs of the scenario.


4. Write your answers below.


After completing the above steps, you will discuss your responses with the
class. The instructor will write the class consensus on a flip chart.
Scenarios

A A large manufacturing company has a set of applications running
with Microsoft
®
SQL Server

back ends and custom-developed
middle-tier objects. Users are required to log in each morning to
check e-mail.
B A Web application with a set of public users who are each allowed to
configure their own settings.


Solution


A






B







Activity 9.6: Identifying Security Models 83



Exercise 2: Analyzing Technology Selection (5 minutes)
!
Analyze technology selection
1. Participate in small groups as assigned by the instructor.
2. Read the scenario below.
3. Validate the feasibility of the solution given in the scenario.
4. Make any comments in the space below.
5. The instructor will discuss answers after the activity is complete.

After completing the above steps, you will discuss your responses with the
class. The instructor will write the class consensus on a flip chart.
Scenario
An n-tier application requires the user to log in at startup. After the user is
logged in, a table is checked and permissions to certain menu items are granted
or denied.
Solution
_______________________________________________________________
_______________________________________________________________
_______________________________________________________________



THIS PAGE INTENTIONALLY LEFT BLANK

×