Analyze information security systems compliance requirements

Assignment Help Other Subject
Reference no: EM132165099

Question: Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control:

• Mandatory access control (MAC)

• Discretionary access control (DAC)

• Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the User Domain.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132165099

Questions Cloud

Identify current ethical challenges presented : Identify current ethical challenges presented by the use of information technology in the workplace.
What did walmart do to enable the company to achieve : Why has Walmart viewed international expansion as a critical part of its strategy? What did Walmart do to enable the company to achieve?
When you should use each one of given types of sql joins : Explain the differences between the SQL INNER JOIN and the SQL LEFT OUTER JOIN. Provide an example of when you should use each one of these types of SQL JOINs.
What challenges do you face as security professionals : What biblical principles are applicable here? Do you think that breaches like these will get worse or better in the future? Why or why not
Analyze information security systems compliance requirements : The specific course learning outcomes associated with this assignment are: Analyze information security systems compliance requirements within the User Domain.
Develop a list of the software needed to restore operations : You are part of a disaster recovery team charged with completing the asset inventory at a small business that primarily sells a small selection of products.
Describe the improper documentation in health records : Provide three examples of improper documentation in health records and describe the impact of each as it pertains to patient safety.
Determine three-dimensional structure of the large subunit : Using bioinformatic tools determine the most likely three-dimensional structure of the large subunit (AmoA) of alkene monooxygenase from Rhodococcus corallinus
What are the basic ways to manage risk in a business : Describe the risk management matrix described in the Startup Entrepreneur's Guide to Risk Management.

Reviews

Write a Review

Other Subject Questions & Answers

  Who is the plaintiff and defendant

What court would have jurisdiction over the suit? Who is the plaintiff? Who is the defendant? On appeal, who is the appellant? What grounds would cause the appellate court to reverse?

  What is the authors credentials

What is/are the author(s)'s credentials? Does he or she have college degrees? What led you to choose this answer? Provide evidence or examples from the text.

  Who has refused implantation of a pacemaker

Who has refused implantation of a pacemaker. Share your thoughts on what the associate must consider before responding to the hospital's request.

  The key events in late nineteenth century that affect care

What are some of the key events in the late nineteenth and twentieth centuries that affected global health? How did they do so?

  Summarize the general environmental ethic of your region

Summarize the general environmental ethic of your region. Do you agree with this ethic or do you believe that it should change. How can citizens, governmental agencies, private corporations, etc. change this environmental ethic?

  Discuss known for writing versions of tristan and isolt

What authors are known for writing versions of Tristan and Isolt

  Case of poor listening

Consider a time when there was a case of poor listening in which you were involved (you might have been the poor listener

  Discusses those conflicts could be seen in delivery system

Write a paper of 1,000-1,200 words that compares and contrasts the competing visions of health care administration among stakeholders, identifies the areas where they conflict, and discusses how those conflicts could be seen in the delivery system..

  Is it worthwhile for winfield to make this change

The annual cost of carrying one trimmer in inventory is $6. The area sales people have recently told Winfield's management that they could expect a $400 improvement in profit (based on current figures of cost per trimmer) if the service level were..

  Important in the management of diabetes

What behavioral factors are important in the management of diabetes? Which is the more effective? Why?

  Identify the elements of good data backup planning

Define, describe and identify the elements of (a) good Data Backup Planning, (b) good Disaster Recovery Planning, and (c) good Business Continuity Planning. Be sure to identify and describe any interdependencies in the planning.

  Describe the first compensation package

Describe the first compensation package offered to Dunlap. Was it well-designed? What type of behavior(s) did it motivate

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd