subject
Computers and Technology, 19.02.2021 16:10 mia3128

1a. Smith Construction is a small construction company consisting of only 8 computers that have Internet access. While they have some proprietary data on their machines, SC is such a small company, they don't have any classification system for their data. And they really don't have much intellectual property on their machines. The only personnel in their company that use the computers are: the owner, the manager, three salespeople, the construction estimator, the foreman, and an administrative assistant. 1b. Network Services IT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. They have their own security staff, including a CISO and several different security managers. All employees communicate using smartphones and e-mail. Many employees work from home and travel extensively.

1c. Secure Commo Parts is a defense contractor that builds communications parts for the military. All employees communicate using smartphones and e-mail. Despite that they make communication parts for the military, very few of the employees have a need for security clearances of any type, as very few of the employees have access to any sensitive material. For example, personnel in the functional areas of order entry, shipping, and invoicing would not have any access to sensitive material. For example, only personnel in research and development and perhaps marketing and sales might need security clearances.

1d. Defense Services Inc. is a military-support branch consisting of 14,000,000 computers with Internet access and 250,000 servers. All employees must have security clearances, and they communicate mainly using company issued Android devices and e-mail.

For each 1a, 1b, 1c and 1d answer which Access Control it fits best out of the four given choices and explain the reasoning WHY it fits best. Each choice may be only used only ONCE.

Discretionary Access Control (DAC)
Role-Based Access Control
Mandatory Access Control (MAC)
Non-Discretionary Access Control

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 22:40
Write a program that defines symbolic names for several string literals (chars between quotes). * use each symbolic name in a variable definition. * use of symbolic to compose the assembly code instruction set can perform vara = (vara - varb) + (varc - vard); ensure that variable is in unsigned integer data type. * you should also further enhance your symbolic logic block to to perform expression by introducing addition substitution rule. vara = (vara+varb) - (varc+vard). required: debug the disassembly code and note down the address and memory information.
Answers: 3
question
Computers and Technology, 23.06.2019 00:50
Representa os dados de um banco de dados como uma coleç? o de tabelas constituídas por um conjunto de atributos, que definem as propriedades ou características relevantes da entidade que representam. marque a alternativa que representa o modelo descrito no enunciado. escolha uma:
Answers: 3
question
Computers and Technology, 23.06.2019 02:30
People with high self-esteem: accept their strengths and weaknesses. believe that failed experiences are failures of their whole self. feel good about who they are only when they reach total success. need positive external experiences to counteract negative feelings that constantly plague them.
Answers: 1
question
Computers and Technology, 23.06.2019 19:00
Acompany is hiring professionals for web designing. the firm is small with few resources. they want employees who possess problem-solving skills and can independently carry out responsibilities. which kind of employee should they select?
Answers: 2
You know the right answer?
1a. Smith Construction is a small construction company consisting of only 8 computers that have Inte...
Questions
question
Mathematics, 09.02.2021 03:50
question
Arts, 09.02.2021 03:50
question
Social Studies, 09.02.2021 03:50