Evaluate the use of mac and dac and rbac methods

Assignment Help Management Information Sys
Reference no: EM132243245

Assignment : Evaluating Access Control Methods

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient.

In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method.

This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control:

1. Mandatory access control (MAC)

2. Discretionary access control (DAC)

3. Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the User Domain.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM132243245

Questions Cloud

How will the industry change in the next five years : What changes will these industries have to make regarding the workforce needed to accommodate the new technologies?
Why is it so important to formulate your brief for a data : Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief.
Develop a script containing three new methods : Add a method to the Turtle class to draw a simple house. It can have a rectangle for the house and an equilateral triangle as the roof.
Write a function to convert celsius to fahrenheit : Test the program by converting 32 degrees Fahrenheit to Celsius and then the product of that function back to Fahrenheit.
Evaluate the use of mac and dac and rbac methods : Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor.
Differences between ipv4 and ipv6 : Are there any benefits to IPv6 besides just being able to supply more address options?
What are vulnerabilities associated with wireless netwoking : What are the vulnerabilities associated with wireless networking?
What are the potential business impacts in the doctor office : Identify any other issues that might be impacted with the loss of the most prominent database?
Prepare an argument explaining the major reasons : Discuss if you believe it is possible for a company to cater to both its best interest and that of the consumer conjointly or if one always has to prevail.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Technology advancement and data collection

Technology Advancement and Data Collection - How does the advancement of technology affect the ability to collect data? Provide examples. Does this advancement also increase the chance for errors?

  Prepare an er diagram for the database

CSE1IS - Information Systems - To apply theoretical concepts of System Design and Implementation in a case study - Prepare an ER diagram for the database. Follow the correct notations for the diagram. All relationships must be labelled with cardinal..

  Name three tools available for threat modeling

Which one of these tools would you recommend and why?

  Network solutions inc nsi provides network services

network solutions inc nsi provides network services to...network solutions inc nsi provides network services to large

  Computers and information processingdescribe what office

computers and information processingdescribe what office automation and group collaboration software will be best for

  Briefly describe the supply chain management system

Briefly describe the supply chain management system. Review the product procurement process (product flow). Describe the activities used to coordinate key players in the product procurement process.

  What information systems does dell need to have to sell

What are the implications of the company's tactics when revenue falls 63 percent but sales fall only 23 percent?

  Research best company practices for the particular topic

Research best company practices for the particular topic. Use at least 10 references from scholarly sources.

  What types of risks or vulnerabilities could be transferred

What types of risks or vulnerabilities could be transferred from a supplier and/or imposed upon a purchaserofcybersecurity related products and/or services?

  What potential impacts of flat world for student performing

What are the potential impacts of a flat world for a student performing a job search? How might this impact your own job search? What can you do to prepare yourself for competing in a flat world?

  Explain about parallel conversion

Parallel Conversion - Prepare a case for either testing the new system extensively, implementing without paralleling with the old system or processing both systems in parallel until any "bugs" have been identified and fixed before the old system i..

  Which products should be prioritised for increase in sales

The company's performance especially its profitability is decreasing due to increased competition and changing customer expectations.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd