Discretionary access control and mandatory access control, Risk Management

Assignment Help:

Question:

(a)

(i) Explain what is meant by Discretionary Access Control and Mandatory Access Control.

(ii) What is the difference between the two types of access control?

(iii) Which method would be the most effective to ensure that users do not share files with other users not approved for access?

(b) Outline the three differences between the Liberty Alliance specification and the Microsoft .NET Passport System.

(c) Which of the following options below would be the MOST effective solution for preventing individuals outside the organization from modifying sensitive information on a corporate database. Explain the reasons for choosing one option and for rejecting the other two options.

Option 1: Screened Subnets
Option 2 : System access logs
Option 3: Role based access controls

(d) (i) Where should the Intrusion Detection System be placed on a network?

(ii) Identify one main weakness of signature based Intrusion Detection Systems.

(iii) Explain what is the main objective of network mapping when conducting a penetration test?

(iv) When is the best time to perform a penetration test?


Related Discussions:- Discretionary access control and mandatory access control

binomial option pricing model , Question 1 Zero coupon yields (all yie...

Question 1 Zero coupon yields (all yields are continuously compounded) are 3.00% for three months, 3.50% for six months, 3.60% for nine months and 3.80% for twelve months. Nort

Utility theory, While uncertain, they have estimated the net revenue from t...

While uncertain, they have estimated the net revenue from this patent to have the proba- bility distribution, ??(??) = ?? ??????(-????) in which ?? = 0.05 and x=million dollars (x

Organisational and communication strategy, An organisational and communicat...

An organisational and communication strategy identifying the procurement and looking at the responsibilities, work breakdown, organisational breakdown AND the management of the cul

Risks associated with cyclone and storm activity, Part A Glenda has ta...

Part A Glenda has taken a household insurance on her classic Queenslander home in North Queensland.  At the time of application, the insurer "URINSURED" asked numerous questio

Bankruptcy of lehman brothers, In its early stages, the financial crisis ma...

In its early stages, the financial crisis manifested itself as an acute liquidity shortage among financial intermediaries. In this phase, concerns over the solvency of the sophisti

Stress testing, How do you carry out stress testing in a mortgage banking i...

How do you carry out stress testing in a mortgage banking institution?

Essentials steps in developing safe systems of work, Question : A safe ...

Question : A safe system of work is a formal procedure which results from a systematic examination of a task in order to identify all the hazards and assess the risks with a vi

Insurance, insurance is a pool of risk?discuss

insurance is a pool of risk?discuss

Execution of a risk analysis, Question: (a) What are the various option...

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd