CIS349 Strayer University Evaluating Access Control Methods discussion

Anonymous
timer Asked: Feb 11th, 2019
account_balance_wallet $25

Question Description

Explain in your own words the elements of the following methods of access control:

    1. Mandatory access control (MAC)
    2. Discretionary access control (DAC)
    3. Role-based access control (RBAC)
  1. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.
  2. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.
  3. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
  4. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Tutor Answer

smithwiliams
School: Rice University

Attached.

1

Running head: ACCESS CONTROL METHODS

Access Control Methods
Name:
Institution:
Course Code:

ACCESS CONTROL METHODS

2

Elements of the Various Access Control Methods
i.

Mandatory Access Control (MAC)

The Main element of MAC is a single secure network from which all security policy
management settings are established and configured. This central network is only accessible to
the system operators. Essentially, the access limitations are based on system configuration,
classification and authentication. The operating system (and operators) constrains the ability of
initiators from accessing or performing certain operations ("Mandatory Access Control", 2019).
This restriction is mainly enforced by the operating system’s kernel, which examines the stated
security attributes via a set of authorization rules (for example policy) which in turn determine
whether the said operation is allowed.
ii.

Discretionary Access Control (DAC)

DAC grants or restricts access to initiators through user credentials provided by the
initiator ("Discretionary Access Control", 2019). Essentially, the initiator’s owner group is
evalua...

flag Report DMCA
Review

Anonymous
awesome work thanks

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors