Describe positive and negative aspects of employing a mac

Assignment Help Computer Engineering
Reference no: EM132597499

Assignment: Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC). and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control: a. Mandatory access control (MAC) b. Discretionary access control (DAC) c. Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC. DAC. and RBA,

3. Suggest methods to mitigate the negative aspects for MAC, DAC. and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment.

Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• This course requires use of Strayer Web, Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

• Include a cover page containing the title of the assignment, the student's name. the professor's name, the course title. and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the User Domain.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clear, and concise, about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132597499

Questions Cloud

Discussion on nature versus nurture : The discussion on nature versus nurture is one that pits two philosophical frameworks against each other.
Prepare total and balance the journals as required : Prepare the Income Statement for the period ended 31 January 2018 on the template provided. Prepare a Bank Reconciliation Statement as at 31 January 2018
Are the images surprising to you or affirming to you : Chapter 3 discusses intercultural views regarding the elderly. Choose one of the photos in the "Intercultural Images" section of the Content area.
What is the EAR of your investment : Suppose you invest $100 for 9 months at 3.25% per annum compounded quarterly. What is the EAR of your investment
Describe positive and negative aspects of employing a mac : Compare and contrast the positive and negative aspects of employing a MAC. DAC. and RBA. Suggest methods to mitigate the negative aspects for MAC, DAC.
Eighth amendment restricts government authority : Explain with examples how the Eighth Amendment restricts the government's authority to make something a crime.
What is the bond price today : The Company issued a 20-year bond five years ago with a face value of $1,000. What is the bond's price today if the coupon rate on comparable new issues is 14%
Discuss the difference between economic value : Discuss the difference between economic value and social value or the shared value creation framework.
Massive loss of life-billions of dollars in property damge : Hurricane Katrina resulted in massive loss of life and billions of dollars in property damage. There were and are many lessons to be learned from this event.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd