Week 4 – Discussion Forum. Which Access Control Is Best? [WLOs: 1, 2, 4] [CLO: 4]

Prior to beginning work on this discussion forum, read Module 08: Security Technology: Access Controls, Firewalls, and VPNs in the Whitman and Mattord textbook. In addition, there are some recommended resources that may help with this discussion.

Your readings discuss several types of access controls. Your organization’s employment practices should address such things as hiring, worker’s performance and duties, and the procedures of employees leaving the organization.

It is important to recognize that hiring an employee signifies a substantial level of trust because they access necessary resources on your systems and network. Therefore, new employees represent one of the greatest risks to the overall security of your organization. Using proper employment practices helps mitigate this inherent threat and what data the employee can access.

In an initial post of at least 250 words, you will

  • Discuss the different types of data classifications such as secret, top secret, and others.
  • Describe the different types of personnel classifications such as role-based access control (RBAC), mandatory access control (MAC), and discretionary access control (DAC).

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.