Explain the mandatory access control

Assignment Help Management Information Sys
Reference no: EM131711048

Assignment : Evaluating Access Control Methods

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient.

In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method.

This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control:

a. Mandatory access control (MAC)

b. Discretionary access control (DAC)

c. Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131711048

Questions Cloud

Cross elasticity of demand of good a : The quantity demanded of good A increases by 10 percent when the price of good B rises by 5 percent and other things remaining the same.
What is the price elasticity of demand for videos : If the quantity demanded of videos decreases by 2 precent when the price of a video rises by 4 percent, what is the price elasticity of demand for videos.
Define the future do oreskes and conway : What problem in the future do Oreskes and Conway describe in " The collapse of Western Civilization" that most frightens you. Why
Create a given artisan 3D pancake : How many cubic units of batter (to some given degree of accuracy) is required to create a given artisan 3D pancake defined by a given blueprint
Explain the mandatory access control : Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
Discuss about the mean as the value of the variable : "One way to deal with discrepancies found in the data obtained from multiple sources is to average the figures and take the mean as the value of the variable."
Free trade using economic terminology : Explain how there are positive and negative results associated with free trade using economic terminology.
Analyze impact of state legislation on funeral service : Analyze Impact of Federal and State legislation on funeral service. Bibliography citing sources, you may use books, journals, magazines or resource on Internet.
Christian conscience plays in the way we should conduct : Explain in an essay what part does personal integrity, and a Christian conscience plays in the way we should conduct research and compose

Reviews

Write a Review

Management Information Sys Questions & Answers

  Requirements of the sarbanes oxley act

In a one- to two- page paper (not including the title and reference pages), explain what the staff should expect the auditors to do. Be sure to include the requirements of the Sarbanes Oxley Act in your explanation.

  Prepare a list of interview questions your team will ask

Prepare a list of interview questions your team will ask senior restaurant employees about process improvements.

  Global information technology reports for japan

Compare the 2012 and 2016 Global Information Technology Reports for Japan. Maintain the formatting and headings. Replace the placeholder paragraphs with actual content. The content should fit within two pages

  Determine whether a given credit card number is valid or not

Implement Luhn's algorithm in a program to determine whether a given credit card number is valid or not. You must test if the number of digits in the input is in the valid range (13 to 16).

  Techniques for developing prototypes of user interfaces

Building on your initial user interface (UI) design mock-up of the organization's program UI, the interface now needs to present more information to the user.

  Report on new accounts created on payment plans

You are an account manager for Inland Jewelers, a regional company that makes custom class rings for graduating seniors.

  Imagine you are an information systems security officer for

imagine you are an information systems security officer for a large federal government contractor. the cio has

  Will you recommend virtualization for verbania

In your opinion, why is virtualization perceived as the holy grail of IT? How can virtualization help Verbania? What are the security considerations? How does it compare with cloud computing?

  Resume the business operations to normal mode

Identify the steps an organization should take to recover from a disaster and resume the business operations to normal mode.

  Purchasing and supply chain managementwhat are five things

purchasing and supply chain management.what are five things you would do to make a commercial difference?if you were

  Discuss vulnerabilities commonly associated with online

Discuss vulnerabilities commonly associated with online or web applications such as buffer overflow, denial-of-service (DoS), and structured query language.

  Examine potential security risks and data breaches

HI5019 STRATEGIC INFORMATION SYSTEMS ASSIGNMENT - BUSINESS REPORT. Examine potential security risks, data breaches

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd