Information Systems Security Discussion Post, writing homework help


Question A

Created to enforce the rules and objectives of an established security policy, access control models dictate how subjects can access objects. There are three main models: discretionary access control (DAC), mandatory access control (MAC), and role-based access control.

Explain how MAC, DAC, and RBAC methods accomplish their objective.  Include the pros/cons,  comparing them against other types of access controls. Describe the type of environment where each of the controls may be used. Justify.

Question B

Each week, research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.