Created to enforce the rules and objectives of an established security policy, access control models dictate how subjects can access objects. There are three main models: discretionary access control (DAC), mandatory access control (MAC), and role-based access control.
Explain how MAC, DAC, and RBAC methods accomplish their objective. Include the pros/cons, comparing them against other types of access controls. Describe the type of environment where each of the controls may be used. Justify.
Question B
Each week, research a unique news story or article related to Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.