CIS 349 Course Great Wisdom / tutorialrank.com CIS 349 Course Great Wisdom / tutorialrank.com | Page 13
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics
and technical style conventions.
===========================================
CIS 349 Week 6 Assignment 3 Evaluating Access Control
Methods (2 Papers)
For more course tutorials visit
www.tutorialrank.com
CIS 349 Week 6 Assignment 3 Evaluating Access Control
Methods
Imagine you are an Information Systems Security Specialist for
a medium-sized federal government contractor. The Chief
Security Officer (CSO) is worried that the organization’s current
methods of access control are no longer sufficient. In order to
evaluate the different methods of access control, the CSO
requested that you research: mandatory access control (MAC),
discretionary access control (DAC), and role-based access
control (RBAC). Then, prepare a report addressing positive and
negative aspects of each access control method. This
information will be presented to the Board of Directors at their
next meeting. Further, the CSO would like your help in
determining the best access control method for the organization.