·
Write clearly and concisely about topics related to information
technology audit and control using proper writing mechanics and
technical style conventions.
==================================================
CIS 349 Week 6 Assignment 3 Evaluating Access Control
Methods (2 Papers)
FOR MORE CLASSES VISIT
www.cis349rank.com
This Tutorial contains 2 Papers on the Below Mentioned Topic
CIS 349 Week 6 Assignment 3 Evaluating Access Control Methods
Imagine you are an Information Systems Security Specialist for a
medium-sized federal government contractor. The Chief Security
Officer (CSO) is worried that the organization’s current methods of
access control are no longer sufficient. In order to evaluate the
different methods of access control, the CSO requested that you
research: mandatory access control (MAC), discretionary access
control (DAC), and role-based access control (RBAC). Then, prepare a
report addressing positive and negative aspects of each access control
method. This information will be presented to the Board of Directors
at their next meeting. Further, the CSO would like your help in
determining the best access control method for the organization.
Write a three to five (3-5) page paper in which you: