Activity9.6:IdentifyingSecurityModels In this activity, you will first identify the optimal security model or method to use in a given situation. Next, you will analyze the security model or method selection in a scenario. Objectives After completing this activity, you will be able to: ! Identify the appropriate securitymodels and methods for a given set of requirements and constraints. Before You Begin This activity includes both small group tasks and class discussion. Prerequisites There are no prerequisites for this activity. Materials There are no materials for this activity. Time to complete this activity: 15 minutes followed by a 10 minute discussion. 82 Activity9.6:IdentifyingSecurityModels Exercise 1: Identifying a Security Method for a Scenario (10 minutes) ! Identify the security requirements 1. Participate in small groups as assigned by the instructor. 2. Read each scenario below. 3. Identify which security method meets the needs of the scenario. 4. Write your answers below. After completing the above steps, you will discuss your responses with the class. The instructor will write the class consensus on a flip chart. Scenarios A A large manufacturing company has a set of applications running with Microsoft ® SQL Server ™ back ends and custom-developed middle-tier objects. Users are required to log in each morning to check e-mail. B A Web application with a set of public users who are each allowed to configure their own settings. Solution A B Activity9.6:IdentifyingSecurityModels 83 Exercise 2: Analyzing Technology Selection (5 minutes) ! Analyze technology selection 1. Participate in small groups as assigned by the instructor. 2. Read the scenario below. 3. Validate the feasibility of the solution given in the scenario. 4. Make any comments in the space below. 5. The instructor will discuss answers after the activity is complete. After completing the above steps, you will discuss your responses with the class. The instructor will write the class consensus on a flip chart. Scenario An n-tier application requires the user to log in at startup. After the user is logged in, a table is checked and permissions to certain menu items are granted or denied. Solution _______________________________________________________________ _______________________________________________________________ _______________________________________________________________ THIS PAGE INTENTIONALLY LEFT BLANK . this activity. Time to complete this activity: 15 minutes followed by a 10 minute discussion. 82 Activity 9. 6: Identifying Security Models Exercise 1: Identifying. Activity 9. 6: Identifying Security Models In this activity, you will first identify the optimal security model or method to