Description
Discussion A:
how to use text mining to analyze how politicians use language to influence voters.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: "words you copied" (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.
Write in essay format not in bulleted, numbered or other list format.
Discussion B:
Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.Hello, here is the final answer and its outline.Go through it and in case of anything, let me know.Regards
1
CLOUD COMPUTING
Organizational Security and Risk Analysis
Student’s Name
Institutional Affiliation
Date
2
CLOUD COMPUTING
Discussion B
Differences and Advantages of MAC, DAC, and RBAC
MAC is one of the types of access control models that stands for Mandatory Access
Control. This security control model uses a systematic approach that allows users to have access
to resources only after given permission by the admin. “The operating system in MAC will
provide access to the user based on their identities and data.” (Penelova & Maria, 2021). An
administrator is the only person who can grant permissions or rights to objects and resources or
modify the object user security label. Since users can't change an object's security controls, this
means that the operating system controls access to the specific app based on what the server
manager sets up in the settings.
DAC stands for Discretionary Access Control. It describes a model of security in which
access is granted based on the user's identity. The only way for a user in the system to be granted
permission to access a system resource is to be placed on an access control list (ACL) affiliated
with the system (Vishaka et al., 2021). According to the DAC principle, subjects have the right
to determine who is allowed to make use of their resources.
RBAC stands for Role-Based Access Control. Access to different types of system
resources is determined in this ...
