Explain how MAC, DAC, and RBAC methods accomplish their objective
Created to enforce the rules and objectives of an established security policy, access control models dictate how subjects can access objects. There are three main models: discretionary access control (DAC), mandatory access control (MAC), and role-based access control.
Explain how MAC, DAC, and RBAC methods accomplish their objective. Include the pros/cons, comparing them against other types of access controls. Describe the type of environment where each of the controls may be used. Justify.
Question B
Each week, research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.