Write a four to five ( 4-5 ) page paper in which you : 1 . Identify the business you have selected .
2 . Create five ( 5 ) cases in which the no-access level should be applied within the selected business environment . Explain the reasons for no access .
3 . Provide five ( 5 ) cases in which the read-access level should be applied within a business environment . Explain the reasons for read access .
4 . Provide five ( 5 ) cases in which the read-write level should be applied within the selected business . Explain the reasons for read-write access .
5 . Determine the type of access levels you would provide to a contractor or consultant .
6 . Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .
Your assignment must follow these formatting requirements :
• Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .
• Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length .
The specific course learning outcomes associated with this assignment are :
• Define authorization and access to an IT infrastructure based on an access control policy framework .
• Use technology and information resources to research issues in access control .
• Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions .