How can the company protect the new consultant network while at the same time providing the protection of data that the stakeholders and customers require?

The case study company has provided you with the flexibility to identify many different information systems that are used by the employees. Some systems need strict access control while others should be available to everyone. What access-control methods need to be employed for the various systems? How can the company protect the new consultant network while at the same time providing the protection of data that the stakeholders and customers require?

In addition, you have been asked to describe 2 access control mechanisms and consider if they can be used in the organization. Describe single sign-on (SSO) and virtual private network (VPN) technology and if they can be used in the company.

• For each of the applications and systems that were described in Week 2, describe the access control mechanisms that are needed for each.

• Describe how the new expanded network can be protected through access control.