Explain the mandatory access control

Assignment Help Management Information Sys
Reference no: EM131711048

Assignment : Evaluating Access Control Methods

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient.

In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method.

This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

1. Explain in your own words the elements of the following methods of access control:

a. Mandatory access control (MAC)

b. Discretionary access control (DAC)

c. Role-based access control (RBAC)

2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.

3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.

5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).

6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131711048

Questions Cloud

Cross elasticity of demand of good a : The quantity demanded of good A increases by 10 percent when the price of good B rises by 5 percent and other things remaining the same.
What is the price elasticity of demand for videos : If the quantity demanded of videos decreases by 2 precent when the price of a video rises by 4 percent, what is the price elasticity of demand for videos.
Define the future do oreskes and conway : What problem in the future do Oreskes and Conway describe in " The collapse of Western Civilization" that most frightens you. Why
Create a given artisan 3D pancake : How many cubic units of batter (to some given degree of accuracy) is required to create a given artisan 3D pancake defined by a given blueprint
Explain the mandatory access control : Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
Discuss about the mean as the value of the variable : "One way to deal with discrepancies found in the data obtained from multiple sources is to average the figures and take the mean as the value of the variable."
Free trade using economic terminology : Explain how there are positive and negative results associated with free trade using economic terminology.
Analyze impact of state legislation on funeral service : Analyze Impact of Federal and State legislation on funeral service. Bibliography citing sources, you may use books, journals, magazines or resource on Internet.
Christian conscience plays in the way we should conduct : Explain in an essay what part does personal integrity, and a Christian conscience plays in the way we should conduct research and compose

Reviews

Write a Review

Management Information Sys Questions & Answers

  Creating the project schedule

Give your opinion on which graphical representation of a project schedule (e.g., Gantt or PERT) is ideal for presenting the project schedule to a company.

  Describe briefly what services they contribute

What personal knowledge management tools does this organization utilize? What steps has this organization taken in securing their information and knowledge? What has this organization done to gain and sustain an advantage over their competitors?

  Describe to the owner the different types of social networks

Describe to the owner the different types of social networks and on-line communities and their business models (how they make their money).

  Digital media project

Digital Media Project-A description of the revisions you would make to your digital media project, an explanation as to why you would make those changes, and an estimate on how long it would take to make the changes

  Distinguish between different types of social media content

Distinguish between the different types of social media content. Explain how marketers develop and organize social media content. Discuss how marketers use search engine optimization and social media optimization to meet marketing objectives.

  Discuss about the applying contract law to non employment

Read the Module 2 assigned readings, which include Chapter 7 from The Farmer's Legal Guide to Producer Marketing Associations titled, "Contract Law Tutorial," and two law exams. In addition to these, using the Argosy University online library reso..

  The difference between inline and passive idps devices

Explain the difference between inline and passive IDPS devices. In preparation for video production, you must submit an outline of your presentation.

  What criteria should be applied to making software choices

What steps are needed to select a brand and model? What criteria should be applied to making the best software choices? How will you determine what needs to be done to ensure security and privacy for the new computers?

  Explain the key elements of managing project risk

Explain the key elements of managing project risk. Why are they important and necessary for the effective managing of project risk?

  How would you define a successful project

Based on what you have seen in your own experience, and based on what you have read so far, how would YOU define a successful project? What do you think contributes to a project being unsuccessful? And, when you read about HUGE failures, do you be..

  Boeing corporation organizing function1 evaluate the

boeing corporation organizing function1. evaluate the organizing function of management as it relates to physical

  How competitive strategy determines value chain structure

A brief explanation of how competitive strategy determines value chain structure. Identify and discuss the competitive strategy that the organization you researched utilizes in order to differentiate them from other  organizations in the same industr..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd