CIS 560 Week 3 Discussion
Access Control in Business. Please respond to the following in YOUR OWN WORDS:
- Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
- The 3 access control strategies include DAC, MAC, and RBAC. Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.
CIS 560 Week 3 Discussion
Access Control in Business. Please respond to the following in YOUR OWN WORDS:
- Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
- The 3 access control strategies include DAC, MAC, and RBAC. Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.
CIS 560 Week 3 Discussion
Access Control in Business. Please respond to the following in YOUR OWN WORDS:
- Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company’s network to conduct business functions. Explain the risks that businesses get exposed to when employees use personal devices over the company’s network.
- The 3 access control strategies include DAC, MAC, and RBAC. Choose a business and provide a specific real-life example of how you could use each of these strategies for that business.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.