Course Hero Logo

CHillAccessControlPlan.docx - 1 Grand Canyon University,...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 3 out of 4 pages.

1Grand Canyon University, College of Science, Engineering, and TechnologyITT-307-0500Access Control PlanAccess control is a way to restrict access to sensitive data or any type of data to certainpeople with the need to know. An access control plan can come in many different forms they can
2be either a logical or physical thing. In any secure and stable network, it is essential to have anaccess control plan implemented. This will not only keep information safe guarded, but it willmitigate the number of eyes that were on that specific data. Below I will go over the differenttypes of access control models that I feel could potentially be a good fit for our organization.First is Mandatory access control (MAC) which is an access control policy that is ablanket rule it applies to all subjects and objects within an information system. MAC is used inmilitary branches and political system because it is very secure and tamper proof. While usingMAC users will only have access to the resources that is essential to doing their job and nothingmore. A system administrator is set in place to grant permissions and access based on the

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 4 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
Scott McCrea
Tags

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture