Access Control Framework and Business Drivers for Access Controls
the subject related to cyber security. you have to sport your answer with citation. you have yo cover all questions.
Discuss some of the access control methods that are utilized within your organization. For example, does your organization leverage public key infrastructure, key card authentication, or login hours?
what access control methods have you seen, and how effective were the control methods? Discuss the pros and cons of each of the controls.