CIS 349 Course Great Wisdom / tutorialrank.com CIS 349 Course Great Wisdom / tutorialrank.com | Page 13

Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions. =========================================== CIS 349 Week 6 Assignment 3 Evaluating Access Control Methods (2 Papers) For more course tutorials visit www.tutorialrank.com CIS 349 Week 6 Assignment 3 Evaluating Access Control Methods Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization’s current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.