Lead Information Technology

Discussion 400 to  450 words:APA Format, need ReferencesYou have been retained as a Lead Information Technology (IT) Director in University of the Cumberlands registrar unit. Student and personnel records are very important to the institution. Recognizing three essential components of access control systems and identification badges, which of these components; discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC) will you implement to support the institution registrar unit.2.  Professional inquiry: which of these three types of can be used to protect and defend access rights to the records, data information of students and personnel embedded in the university registrar unit?i.  Role-based access control ii.  Discretionary access control iii.  Mandatory access controliv.  Relational access controlCorrect Answer Only [     ]Provide comprehensive narrative on how your plan of action will postulate offensive and defensive measures for university of the Cumberland’s registrar unit.Assignment 550 to 600 wordsAPA Format, need ReferencesChain link fence is strong, resilient, extremely durable, and entrenched with psychological deterrence against intruders. Provide comprehensive narrative on advantages of chain-link fence in organization.Design all-inclusive plan of action on weaknesses of chain-link fence in organization and adequate measures to mitigate futures incidence.

Connection failed: Access denied for user 'assiriyp_opskill'@'localhost' (using password: YES)