Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | May 2017 |
Last Sign in: | 189 Weeks Ago, 2 Days Ago |
Questions Answered: | 27237 |
Tutorials Posted: | 27372 |
MCS,MBA(IT), Pursuing PHD
Devry University
Sep-2004 - Aug-2010
Assistant Financial Analyst
NatSteel Holdings Pte Ltd
Aug-2007 - Jul-2017
Discussion
Question A
Created to enforce the rules and objectives of an established security policy, access control models dictate how subjects can access objects. There are three main models: discretionary access control (DAC), mandatory access control (MAC), and role-based access control.
Explain how MAC, DAC, and RBAC methods accomplish their objective. Include the pros/cons, comparing them against other types of access controls. Describe the type of environment where each of the controls may be used. Justify.
Question B
Each week, research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.
Â
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll