Analyze information security systems compliance requirements

Assignment Help Other Subject
Reference no: EM132165099

Question: Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control:

• Mandatory access control (MAC)

• Discretionary access control (DAC)

• Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the User Domain.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132165099

Questions Cloud

Identify current ethical challenges presented : Identify current ethical challenges presented by the use of information technology in the workplace.
What did walmart do to enable the company to achieve : Why has Walmart viewed international expansion as a critical part of its strategy? What did Walmart do to enable the company to achieve?
When you should use each one of given types of sql joins : Explain the differences between the SQL INNER JOIN and the SQL LEFT OUTER JOIN. Provide an example of when you should use each one of these types of SQL JOINs.
What challenges do you face as security professionals : What biblical principles are applicable here? Do you think that breaches like these will get worse or better in the future? Why or why not
Analyze information security systems compliance requirements : The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the User Domain.
Develop a list of the software needed to restore operations : You are part of a disaster recovery team charged with completing the asset inventory at a small business that primarily sells a small selection of products.
Describe the improper documentation in health records : Provide three examples of improper documentation in health records and describe the impact of each as it pertains to patient safety.
Determine three-dimensional structure of the large subunit : Using bioinformatic tools determine the most likely three-dimensional structure of the large subunit (AmoA) of alkene monooxygenase from Rhodococcus corallinus
What are the basic ways to manage risk in a business : Describe the risk management matrix described in the Startup Entrepreneur's Guide to Risk Management.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd