CIS 349 RANK Future Starts Here/cis349rank.com CIS 349 RANK Future Starts Here/cis349rank.com | Page 10

· Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions. ================================================== CIS 349 Week 6 Assignment 3 Evaluating Access Control Methods (2 Papers) FOR MORE CLASSES VISIT www.cis349rank.com This Tutorial contains 2 Papers on the Below Mentioned Topic CIS 349 Week 6 Assignment 3 Evaluating Access Control Methods Imagine you are an Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization’s current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization. Write a three to five (3-5) page paper in which you: