an I get some info with this W3A1

User Generated

Oenaqba J

Computer Science

Description

Organizations have various options when it comes to access control techniques. The common access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). Over the last five years, there has been a rapid growth in user-authentication technologies. As hackers have become more intelligent in breaking a system, more efficient authentication techniques are necessary.

Based on what you have learned so far, answer the following questions:

  • Explain the differences between DAC, MAC, and RBAC.
  • Which model would you suggest an organization should implement? Why?
  • When would you use one model over the other? Provide a rationale in support of your answer.
  • Choose three authentication techniques and discuss their advantages and disadvantages. What are the different situations in which you suggest the use of each of the three authentication techniques? Provide rationale to support your answer.
  • What are the common types of unauthorized access and security concerns, of having a wireless network?
  • Do you think the reward associated with wireless networks is more than the risk? Why or why not? Provide rationale in support of your answer.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags