DQ 1: In role-based systems, you want to establish mutually exclusive roles to prevent assignment of conflicting permissions to a single role. Provide examples of two similar job functions that have differing access roles. What would be all of the types of systems to which you would grant each role access?
DQ 2: Based on the Barr (2010) article, what software must be considered to provide adequate security management across the enterprise?
DQ 3: Based on the Barr (2007) article, what changes would you recommend for the Information Security Forum