CIS 349 RANK Learn Do Live /cis349rank.com CIS 349 RANK Learn Do Live /cis349rank.com | Page 12

access control are no longer sufficient . In order to evaluate the different methods of access control , the CSO requested that you research : mandatory access control ( MAC ), discretionary access control ( DAC ), and role-based access control ( RBAC ). Then , prepare a report addressing positive and negative aspects of each access control method . This information will be presented to the Board of Directors at their next meeting . Further , the CSO would like your help in determining the best access control method for the organization .
Write a three to five ( 3-5 ) page paper in which you :
Explain in your own words the elements of the following methods of access control : Compare and contrast the positive and negative aspects of employing a MAC , DAC , and RBAC .
Mandatory access control ( MAC ) Discretionary access control ( DAC ) Role-based access control ( RBAC )
Suggest methods to mitigate the negative aspects for MAC , DAC , and RBAC .
Evaluate the use of MAC , DAC , and RBAC methods in the organization and recommend the best method for the organization . Provide a rationale for your response .
Speculate on the foreseen challenge ( s ) when the organization applies the method you chose . Suggest a strategy to address such challenge ( s ).
Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .
Your assignment must follow these formatting requirements :