CIS 349 RANK Extraordinary Success /cis349rank.com CIS 349 RANK Extraordinary Success /cis349rank.com | Page 11

FOR MORE CLASSES VISIT www. cis349rank. com

This Tutorial contains 2 Papers on the Below Mentioned Topic CIS 349 Week 6 Assignment 3 Evaluating Access Control Methods
Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer( CSO) is worried that the organization’ s current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control( MAC), discretionary access control( DAC), and role-based access control( RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.
Write a three to five( 3-5) page paper in which you:
Explain in your own words the elements of the following methods of access control: Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.
Mandatory access control( MAC) Discretionary access control( DAC) Role-based access control( RBAC)
Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.