CIS 560 RANK Learn Do Live /cis560rank.com CIS 560 RANK Learn Do Live /cis560rank.com | Page 6

• Define authorization and access to an IT infrastructure based on an access control policy framework. • Describe methods that mitigate risk to an IT infrastructure’s with confidentiality, integrity, availability and access controls • Use technology and information resources to research issues in access control. • Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions. ===================================================================================== CIS 560 Week 3 Assignment 1 Access Restrictions (2 Papers) FOR MORE CLASSES VISIT www.cis560rank.com This Tutorial contains 2 Papers Assignment 1: Access Restrictions Due Week 3 and worth 80 points In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. There are three levels of information access: no access, read access, and read-write access. Use a business of your choice to answer the criteria for this assignment.