What is information security? What are some of the challenges associated with keeping your own information safe within the digital world? Provide one example 200 words
What are access controls in the computer world? Relate access control in the computer world to the physical world. In your own words, provide an example of physical access control and tie it back to the digital landscape. Often in cybersecurity, we use compensating controls to mitigate vulnerabilities. Identify some physical vulnerabilities related to your example. What are some compensating controls we could use? Explain your reasoning.
Textbooks define three different types of access control: RBAC, MAC, and ABAC.
Research either rule-based or discretionary-based access control.
Compare and contrast your chosen access control to those provided by the textbooks.
Provide an example of how each should be deployed and include an explanation of what makes each unique in comparison to the other.