Reference no: EM131420535
Assignment: Evaluating Access Control Methods
Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.
Write a three to five (3-5) page paper in which you:
1. Explain in your own words the elements of the following methods of access control:
a. Mandatory access control (MAC)
b. Discretionary access control (DAC)
c. Role-based access control (RBAC)
2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.
3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.
4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).
6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
The specific course learning outcomes associated with this assignment are:
- Analyze information security systems compliance requirements within the User Domain.
- Use technology and information resources to research issues in security strategy and policy formation.
- Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.
Role of art in america since the gilded age
: Write a 1500-word paper, discussing the role of art in America since the Gilded Age. Include discussion of the following:
|
Refused to fill out a loyalty questionnaire
: In 1949, there was a case between an employee, Mr. Duberg, and the U.S. government while he was employed at UNESCO in Paris. Mr. Duberg refused to fill out a loyalty questionnaire. In 2015, do you think there are cases that may arise as an internatio..
|
What are the motives and consequences of using such tactics
: Compare and contrast the distributive bargaining and integrative negotiation situation. Identify the strengths and weaknesses of each method, and how they affect the negotiation process. Identify and explain the kinds of tactics in negotiation that..
|
Discuss the major categories of reimbursements
: Outline and discuss the major categories of reimbursements and costs in a health care organization. How do they influence each other - In addition, how do expenses and revenues affect the specific types of budgets outlined?
|
Analyze information security systems compliance requirement
: The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the User Domain. Use technology and information resources to research issues in security strategy and polic..
|
Identify one contemporary technology
: Identify one contemporary technology (e.g., the cell phone), and discuss how it has affected the world we live in. How do you see this technology affecting nation-states as a whole?
|
What is the role of data discovery in corporate decision
: What is the role of data discovery in corporate decision making within your own organization or an organization in which you are familiar with? How do you utilize mobile dashboards within your own experience? What are the benefits and challenges in u..
|
Why is thinning occurring in the walls of the cup
: What changes could be made in the operation to correct the problem?
|
How will your hospital most likely be reimbursed
: Does Mr. Smith fit the typical profile for an uninsured person in the United States? Justify your answer and how will your hospital most likely be reimbursed for Mr. Smith's medical care?
|