Create a report addressing positive and negative aspects

Assignment Help Management Information Sys
Reference no: EM132075416

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor.

The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient.

In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC).

Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting.

Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

Explain in your own words the elements of the following methods of access control:

Mandatory access control (MAC)

Discretionary access control (DAC)

Role-based access control (RBAC)

Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze information security systems compliance requirements within the User Domain.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132075416

Questions Cloud

Effective interest rate of a simple discount note : What is the effective interest rate of a simple discount note for $3,500 at a bank discount rate of 11%, for 24 months? (Round to the nearest tenth percent)
Consecutive annual increase in the poverty rate : This was the third consecutive annual increase in the poverty rate. Since 2007, the poverty rate has increased by 2.6 percentage points, from 12.5 percent
Identifing findings in research on hotels : What is the process for conducting research and identifing findings in research on hotels?
Principles of finance : Principles of finance QUESTIONS: 12-1, a.Define each of the following terms. b.Operating plan, financial plan c.spontaneous liabilities, profit margin
Create a report addressing positive and negative aspects : Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor.
Why income statement of a manufacturing company differs : Explain why the income statement of a manufacturing company differs from the income statement of a merchandising company. (3 to 5 sentences).
Design a proposal for a process improvement : Design a proposal for a process improvement or cultural change that would affect all levels of staff in the organization - How is Everett M. Rogerss Diffusion
What do you want your group members to know : How will you synthesize and present the content of the source to share? What do you want your group members to know, and what do they need to know?
What is the expected return on the company equity : What is the expected return on the company's equity before the announcement of the debt issue? Construct the company's market value balance sheet.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explicate how digital forensics was used

Determine at least one (1) forensic evidence collection topic you learned and/or found interesting from reading the article.

  What are effective tools you may use to reduce resistance

What are some of the effective tools you may use to reduce resistance to system change and increase awareness of your ERP implementation plans?

  Write a paper about the case study titled ing life

Write a paper about the case study titled ING Life: Compare and contrast among local area and wide area network technologies and architectures.· Compare and contrast among data communication technologies that include transmission med..

  Important information about global managementcompare and

important information about global managementcompare and contrast decision making at headquarters and at foreign

  Why mitigating risk is essential to operational efficiency

In addition, explain why mitigating risk and making better decisions are essential to operational efficiency. Conclusion and a reference page.

  The growth of crowdsourcing in the field of interface design

Analyze and discuss at least three (3) challenges of incorporating crowdsourcing in a design project.

  Does being watched change one as a person

Think about the slogan "SECRETS ARE LIES | SHARING IS CARING | PRIVACY IS THEFT", along with Mae's going transparent.

  What are strategies behind implementing risk management

What are some of the major strategies behind implementing risk management programs in today's technology filled world?

  Research at least two articles on the evolution and trends

Research at least two articles on the topic of Information systems infrastructure: evolution and trends. Write a brief synthesis and summary of the two articles

  Explain the interest that stakeholder has development ea

First, explain the interest or concern that the stakeholder has in the development of the EA. Then, identify their "class" or role in the EA as one of the four shown above (Key Player, Keep Satisfied, Keep Informed, or Minimal Effort). Finally, br..

  Monitoring employee in workplace by using digital technology

Monitoring employees in workplace by using digital monitoring technologies. My part is Advantages and Disadvantages of using technologyto monitoring employees at the workplace

  Journalize about your interactions with technology

journalize about your interactions with technology, particularly the use of a phone, television, radio, tablet, laptop, or desktop

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd