CIS349 Strayer University Evaluating Access Control Methods discussion

CIS349 Strayer University Evaluating Access Control Methods discussion

Explain in your own words the elements of the following methods of access control:

    1. Mandatory access control (MAC)
    2. Discretionary access control (DAC)
    3. Role-based access control (RBAC)
  1. Compare and contrast the positive and negative aspects of employing a MAC, DAC, and RBAC.
  2. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.
  3. Evaluate the use of MAC, DAC, and RBAC methods in the organization and recommend the best method for the organization. Provide a rationale for your response.
  4. Speculate on the foreseen challenge(s) when the organization applies the method you chose. Suggest a strategy to address such challenge(s).
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper