FOR MORE CLASSES VISIT www . cis349rank . com
This Tutorial contains 2 Papers on the Below Mentioned Topic CIS 349 Week 6 Assignment 3 Evaluating Access Control Methods
Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor . The Chief Security Officer ( CSO ) is worried that the organization ’ s current methods of access control are no longer sufficient . In order to evaluate the different methods of access control , the CSO requested that you research : mandatory access control ( MAC ), discretionary access control ( DAC ), and role-based access control ( RBAC ). Then , prepare a report addressing positive and negative aspects of each access control method . This information will be presented to the Board of Directors at their next meeting . Further , the CSO would like your help in determining the best access control method for the organization .
Write a three to five ( 3-5 ) page paper in which you :
Explain in your own words the elements of the following methods of access control : Compare and contrast the positive and negative aspects of employing a MAC , DAC , and RBAC .
Mandatory access control ( MAC ) Discretionary access control ( DAC ) Role-based access control ( RBAC )
Suggest methods to mitigate the negative aspects for MAC , DAC , and RBAC .