Q 1: Why should an organization consider implementing Role-Based Access Control (RBAC) over Discretionary Access Controls (DAC) or Mandatory Access Controls (MAC)? Provide an example to put into context the differences between the three approaches.
DQ 2: Based on the Barr (2009) article, how can RFID technology be applied to providing enterprise security? What are the major factors to consider when employing this technology?
DQ 3: Based on the Barr (2010) article, what strategies should be employed to guarantee 100% Web site availability for the Enterprise?