Mandatory access control and discretionary access control

Assignment Help Management Information Sys
Reference no: EM132241148

Assignment

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient.

In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method.

This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

Explain in your own words the elements of the following methods of access control:

Mandatory access control (MAC)

Discretionary access control (DAC)

Role-based access control (RBAC)

Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze information security systems compliance requirements within the User Domain.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132241148

Questions Cloud

Compute amounts of any liability for compensated absences : Compute the amounts of any liability for compensated absences that should be reported on the balance sheet at December 31, 2016 and 2017
Evaluate the current pay structure used by your company : BUS 409 COMPENSATION MANAGEMENT - Strayer University - Determine the most beneficial ratio of internally consistent and market consistent compensation systems
Explain why the team performed so well or so poorly : Discuss the team dynamics for a highly effective or ineffective team of which you were a member.
A brief discussion on the security of the internet of things : Describe what IoT is; what are some of the security risks and issues with IoT devices; what steps can be taken to mitigate these risks?
Mandatory access control and discretionary access control : Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor.
Improve cultural awareness related to doing business : Improve your cultural awareness related to doing business in another country or with another culture - Discuss at least three of the categories
Describe the data breach incident and the primary causes : Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines.
What role end-users typically play in incident reporting : Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences?
Consider how to handle new hires and job changes : Discuss, in your own words using 500 words or more, the relationship between users and roles in databases.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Briefly describe the organization that you chose

Briefly describe the organization that you chose. Identify which regulation you would associate with that organization.

  Describe the emerging technologies

These are just a very few terms related to the computer industry, emerging technologies and intelligent information systems.

  Explain about a cloud-based office productivity suite

The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites.

  Discusses differences between data warehouses and data marts

Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. You must use the CSU Online Library to loc..

  Discuss about the critical fundamental skills from the it

Create a presentation containing eight to ten presentation slides including Introduction, Conclusion, and Reference slides.Include speaker notes with each slide.Note. Be sure to include supportive graphics and appropriate backgrounds and styles. Al..

  Explore netsuites components that relate to your business

Identify and explore NetSuite's components that relate to your business major(IT).Click on the "Customers" link on NetSuite's home page and select a customer in an industry that interests you ( Read the customer's success story. What benefits were ..

  Mayo clinic turns to game processor to save lives

Analyze the case taking a con approach to their practices - Mayo Clinic Turns to Game Processor to Save Lives

  What are the benifts of cloud computing

Determine whether or not there are definite characteristics of organizations that are more likely to use cloud computing than other organizations.

  Explain the evolution of cyberspace through time

Explain the evolution of cyberspace through time. Identify one of the biggest developments that have changed the face of cyberspace. Examine the advent of e-Commerce and its impact on cybersecurity.

  Total quality management style

Show the characteristics of the other organization's Total Quality Management style and compare those characteristics with your own organization.

  Criteria for an agile company

How does the Wikimedia Foundation meet the criteria for an "agile" company and how does the Wikimedia Foundation meet the criteria for a "virtual" company?

  What information is provided by cctv systems

What information is provided by CCTV Systems and how is information stored? How do Photo ID and Badge Systems work with Restricted Access Control Systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd