What steps are necessary to mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.

Research some of the access control methods that are utilized within your organization. For example, does your organization leverage public key infrastructure, key card authentication, or login hours? For this critical thinking assignment. Write a professional report that include all of the following:

  • what access control methods have you seen.
  • how effective were the control methods?
  • Explore the pros and cons of each of the controls in your paper.
  • What steps are necessary to mitigate risk to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
  • Be sure to provide citations from your readings and additional research to support your statements.
  • Must Citing the references and use figures and tables where appropriate.
  • Must be the report including introduction and conclusion.
  • Must be the report free of plagiarism and clearly, organize and well written.
  • APA style, fifth pages in length, not including the title and reference pages.
  • References must be from journal articles published in well-known publishers’ databases such as (IEEE, Springer, Elsevier, Wiley, and Taylor & Francis).