Reference no: EM131017261
1)"Role-Based Access Controls" Please respond to the following:
A) Consider at least one (1) alternative to role-based access controls, and indicate where you believe this alternative method would help the security of the organization prosper. Perform research as needed and justify your answer.
B) From the e-Activity (Read the articles "Role Based Access Control (RBAC) and Role Based Security", located at https://csrc.nist.gov/groups/SNS/rbac/ ), and ("Logical Access Control", located in second attachment), consider role-based access control (RBAC) methods in terms of file-level and database permissions, and formulate what you believe are the main advantages to using these methods in order to achieve ample security.
2) Mainframes. Please respond to the following:
A) Take a position on the following statement, "Mainframe computers are still needed even though personal computers and workstations have increased in capabilities." Defend your position by providing at least one example to support your position.
B) Analyze the differences between distributed data processing and centralized data processing. Provide an example of each. Then compare each to the processing used in cloud computing.
3) Circuit Switching and Packet Switching. Please respond to the following:
A) Cite two examples of a circuit switch and packet switch environment. Base one example on a circuit switch and the other on a packet switch. Describe the trade-off between the two technologies and the reason why packet switching is more appropriate for the Internet.
B) Assuming your daily routine stayed the same, speculate the problems you would have if the Internet didn't exist. Speculate the problems of a familiar organization given the same scenario.