Access Controls - Explain how MAC, DAC, and RBAC methods accomplish their objective

Nov 1st, 2015
SoccerBoss
Category:
Engineering
Price: $10 USD

Question description

Question A

Created to enforce the rules and objectives of an established security policy, access control models dictate how subjects can access objects. There are three main models: discretionary access control (DAC), mandatory access control (MAC), and role-based access control.

Explain how MAC, DAC, and RBAC methods accomplish their objective. Include the pros/cons, comparing them against other types of access controls. Describe the type of environment where each of the controls may be used. Justify.


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UIUC
PREMIUM TUTOR

Studypool has helped 1,244,100 students

Summary
Quality
Communication
On Time
Value
tinytim47
Feb 23rd, 2017
" Wow this is really good.... didn't expect it. Sweet!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1830 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors