Evaluate the use of mac dac and rbac methods in organization

Assignment Help Operating System
Reference no: EM131396176

Assignment: Evaluating Access Control Methods

Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control:

a. Mandatory access control (MAC)
b. Discretionary access control (DAC)
c. Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze information security systems compliance requirements within the User Domain.
• Use technology and information resources to research issues in security strategy and policy formation.
• Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Reference no: EM131396176

Questions Cloud

Write a program that accepts or rejects applicants for seaso : If the student does not meet either of the qualification criteria, print "Reject". Save the program as Admission.cpp.
Criticize the given definitions - history : Criticize the following definitions in light of the eight rules for lexical definitions:- History is the unfolding of miscalculations.
Amount of previous workers : 1. According to the principle of diminishing returns, if the number of workers is increased beyond the point of diminishing returns, then the additional worker:
Criticize the given definitions - clock : Criticize the following definitions in light of the eight rules for lexical definitions:- "Clock" means a manufactured device featuring two pointers that rotate past a set of numerals ranging from 1 to 12.
Evaluate the use of mac dac and rbac methods in organization : Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
The spiritual dispositions of emerging teachers : Create a summary of the reading, also, develop two critical questions rising from the reading along with two ideas/concepts that you have found enlightening or thought to provoke.
Write a program that allows user to enter two numeric value : The user should be able to enter the uppercase initial, lowercase initial, or the arithmetic symbol. Perform the arithmetic operation that the user selects and display the results. Save the file as FlexibleArithmeticChoice.cpp.
Criticize the given definitions - soap : Criticize the following definitions in light of the eight rules for lexical definitions:- "Soap" means saponified glyceride.
What is double consciousness : What is "double consciousness?" How does it relate to intersectionality? How are the concepts similar? How are they different?

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd