Computer Science
Rider University Mandatory Access Control Discussion Questions

Rider University

Question Description

I’m trying to learn for my Computer Science class and I’m stuck. Can you help?


Q1. (Articles): Find an article written in 2019 only that talks about any of the following: RBACs, MAC, DAC, ACL, Group policies, or LDAP. Quote from the author and provide your opinion.

Q2. (Question from the Book)Discuss the advantages and disadvantages of the following four access control models:
a. Mandatory Access Control (MAC)
b. Discretionary Access Control (DAC)
c. Role Based Access Control (RBAC)
d. Rule Based Access Control (RBAC)

Q3. (Explain it to an end-user) You are sitting in a room with the CEO. She/He is a basic user with little to no computer experience.
- Explain to him/her the following terminology: Identification, Authentication, Authorization, and Access
- Describe a scenario or draw a picture to get your point across.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer


Running Head: DISCUSSION


Questions from the Book
Student’s Name
Institutional Affiliation



Questions from the Book
Question A: Mandatory Access Control
This is one of the types of access control whereby the operating system compels the
capability of an initiator to perform some kind of operation on a target. With this policy, the
users do not have any capacity to ignore the plan because a security policy director mainly
operates it. It has several advantages and disadvantages. The benefits include; Mandatory access
control policy ensures the reduction of security breaches because it is centrally controlled by an
administrator (Osborn 2017). Also, a Mandatory access control policy adapts a system of
describing and labeling application information hence establishing an exclusive external
application retrieval control strategy. The disadvantages are that; It is a costly policy to adopt,
especially when trying to separate branded security domains that are found connected in the
same computer system. Also, the initiators can only access a target only if the initiator clearance
equals or is more than the target's label.
Question B: Discretionary Access Control
This is a type of access control that gives initiators full authority of the targets they have
been allowed to access while also sharing the targets with other initiators. In this case, the
initiators are given authority and control their information. Discretionary Access Control
facilitates the reduction of security breaches by preventing malware attacks by unauthorized
users, which raises its reliability in usage by most companies (Bugliesi, Colazzo, and Crafa
2017). Discretionary Access Control saves the organization money that would be used otherwise
in manually monitoring eac...

TeacherAli (16678)

Thanks for the help.

Outstanding. Studypool always delivers quality work.

Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.