subject
Computers and Technology, 19.02.2021 16:10 mia3128

1a. Smith Construction is a small construction company consisting of only 8 computers that have Internet access. While they have some proprietary data on their machines, SC is such a small company, they don't have any classification system for their data. And they really don't have much intellectual property on their machines. The only personnel in their company that use the computers are: the owner, the manager, three salespeople, the construction estimator, the foreman, and an administrative assistant. 1b. Network Services IT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. They have their own security staff, including a CISO and several different security managers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.

1c. Secure Commo Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail. Despite that they make communication parts for the military, very few of the employees have a need for security clearances of any type, as very few of the employees have access to any sensitive material. For example, personnel in the functional areas of order entry, shipping, and invoicing would not have any access to sensitive material. For example, only personnel in research and development and perhaps marketing and sales might need security clearances.

1d. Defense Services Inc. is a military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using company issued Android devices and e-mail.

For each 1a, 1b, 1c and 1d answer which Access Control it fits best out of the four given choices and explain the reasoning WHY it fits best. Each choice may be only used only ONCE.

Discretionary Access Control (DAC)
Role-Based Access Control
Mandatory Access Control (MAC)
Non-Discretionary Access Control

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:30
Advantages and disadvantages of binary system
Answers: 1
question
Computers and Technology, 22.06.2019 06:30
Requirement types discussed during software development include functional and color scheme nonfunctional and code style constraint and nonfunctional fashionable and functional.
Answers: 2
question
Computers and Technology, 22.06.2019 16:20
Octothorpe is another name for what common computer keyboard symbol?
Answers: 1
question
Computers and Technology, 23.06.2019 12:30
Animations and transitions are added from the
Answers: 1
You know the right answer?
1a. Smith Construction is a small construction company consisting of only 8 computers that have Inte...
Questions
question
Mathematics, 11.09.2021 05:10
question
Mathematics, 11.09.2021 05:10
question
English, 11.09.2021 05:10
question
Mathematics, 11.09.2021 05:10
question
Social Studies, 11.09.2021 05:10
question
Computers and Technology, 11.09.2021 05:10
Questions on the website: 13722367