Evaluating Access Control Methods, management homework help

User Generated

Nyrkqnqba44

Business Finance

Description

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (RBAC). Then, prepare a report addressing positive and negative aspects of each access control method. This information will be presented to the Board of Directors at their next meeting. Further, the CSO would like your help in determining the best access control method for the organization.

Write a three to five page paper in which you:

  1. Explain in your own words the elements of the following methods of access control:
    1. Mandatory access control (MAC)
    2. Discretionary access control (DAC)
    3. Role-based access control (RBAC)
  2. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.
  3. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.
  4. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
  5. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).
  6. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: EVALUATION ACCESS CONTROL METHODS

Evaluating Access Control Methods

Institution Affiliation
Date

1

EVALUATION ACCESS CONTROL METHODS
Introduction
Access control generally refers to limiting the access or rather the number of individuals
who can get a hold of a resource or get access to a certain location. This is important to
organizations as it helps in protecting the information that is confidential. It also helps in
managing the users by controlling them to what they need access on without interfering with
other peoples work.
Methods of access control
Mandatory Access Control generally refers to a control that limits a subject from gaining
access to a target or hinders the performance of certain operations through the computer system.
Subjects often seek authorization to access different control functions (Chin, 2011).
The OS system is responsible for determining the existence of the authorization and the
level of the authorization itself. Discretionary Access Control system restricts the availability of
commands to different users. However, the criterion used by the access control is unique in that
it considers the class or rather the group as well as the subject of the object that seeks
authorization to access the target.
The Mandatory Access Control is a higher control when compared to the Discretionary...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags