CIS 502 Week 2 Discussion Questions – Strayer New
Click On The Link Below to Purchase A+ Graded Material
Week 2 DQ 1
“Attacks Against Access Control” Please respond to the following:
• Argue which access control attack is the most difficult to defend against. Support your argument.
• Analyze role-based access control methods and describe how to implement them in a database.
Week 2 DQ 2
“Loss of Confidentiality” Please respond to the following:
• Create a scenario in which two-factor authentication should be used and explain why.
• From the e-Activity, identify the industry or organization you chose to research and describe the access control methods used to protect its assets from unauthorized users.