Question: Question 1: 1a. Smith Construction is a small construction company consisting of only 8 computers that have Internet access. While they have some proprietary data

Question 1:

1a. Smith Construction is a small construction company consisting of only 8 computers that have Internet access. While they have some proprietary data on their machines, SC is such a small company, they don't have any classification system for their data. And they really don't have much intellectual property on their machines. The only personnel in their company that use the computers are: the owner, the manager, three salespeople, the construction estimator, the foreman, and an administrative assistant.

1b. Network Services IT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. They have their own security staff, including a CISO and several different security managers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.

1c. Secure Commo Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail. Despite that they make communication parts for the military, very few of the employees have a need for security clearances of any type, as very few of the employees have access to any sensitive material. For example, personnel in the functional areas of order entry, shipping, and invoicing would not have any access to sensitive material. For example, only personnel in research and development and perhaps marketing and sales might need security clearances.

1d. Defense Services Inc. is a military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using company issued Android devices and e-mail.

For each 1a, 1b, 1c and 1d answer which Access Control it fits best out of the four given choices and explain the reasoning WHY it fits best. Each choice may be only used only ONCE.

  • Discretionary Access Control (DAC)
  • Role-Based Access Control
  • Mandatory Access Control (MAC)
  • Non-Discretionary Access Control

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!