Evaluate the use of mac dac and rbac methods in organization

Assignment Help Operating System
Reference no: EM131396176

Assignment: Evaluating Access Control Methods

Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control:

a. Mandatory access control (MAC)
b. Discretionary access control (DAC)
c. Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the User Domain.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131396176

Questions Cloud

Write a program that accepts or rejects applicants for seaso : If the student does not meet either of the qualification criteria, print "Reject". Save the program as Admission.cpp.
Criticize the given definitions - history : Criticize the following definitions in light of the eight rules for lexical definitions:- History is the unfolding of miscalculations.
Amount of previous workers : 1. According to the principle of diminishing returns, if the number of workers is increased beyond the point of diminishing returns, then the additional worker:
Criticize the given definitions - clock : Criticize the following definitions in light of the eight rules for lexical definitions:- "Clock" means a manufactured device featuring two pointers that rotate past a set of numerals ranging from 1 to 12.
Evaluate the use of mac dac and rbac methods in organization : Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
The spiritual dispositions of emerging teachers : Create a summary of the reading, also, develop two critical questions rising from the reading along with two ideas/concepts that you have found enlightening or thought to provoke.
Write a program that allows user to enter two numeric value : The user should be able to enter the uppercase initial, lowercase initial, or the arithmetic symbol. Perform the arithmetic operation that the user selects and display the results. Save the file as FlexibleArithmeticChoice.cpp.
Criticize the given definitions - soap : Criticize the following definitions in light of the eight rules for lexical definitions:- "Soap" means saponified glyceride.
What is double consciousness : What is "double consciousness?" How does it relate to intersectionality? How are the concepts similar? How are they different?

Reviews

Write a Review

Operating System Questions & Answers

  A system uses a page size

A system uses a page size of the 4 Kbytes and a program size of 46 kbytes is allocated memory. what is the fragmentation?

  Question about lan operating systems

Assume you are network administrator for a new corporation that has ten users and plans to add five more users within a year. The files require to be accessed by all ten users and each user must have different security rights.

  Write the send and receive primitives for stated processes

Write the send and receive primitives for stated processes and processes can communicate with each other by name along with message. You need to Identify what type of IPC is this?

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

  Write a page fault handler process that can be invoked

Write a page fault handler process that can be invoked by the interrupt dispatcher when a page fault occurs. The address space and page number of the missing page are made available to the fault handler by the addressing hardware.

  Develop should take a message given as a command

The program you develop should take a message given as a command line argument and append it to a file (also specified on the command line). The file should have no permissions, both before and after the message is appended. Of course, the file sh..

  Explain why network operating systems were phased out

Explain why network operating systems were phased out when distributed Operating systems gained popularity.

  What are the implications of the mini-hypervisor

What are the implications of this mini-hypervisor? What kind of administration/management would need to be in place to keep all these optimized? What kind of security? Do you really need virtual machines to achieve cloud computing?

  Use m8c assembler directives to allocate

Use M8C assembler directives to allocate the constants in ROM. Assume that they are all in the "lit" area.

  Design and create an efficient, well-documented solution

There are two types of accounts: Standard and Gold. The Standard account has a monthly interest rate of 18% and a monthly credit limit of $4000.

  How operating system is clearly superior for any application

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. If you don't think that one operating system is clearly superior for this application, describe why.

  The change in the firewall performance

Automation the process of unifying the change in the firewall performance

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd