Authors of IT books will discuss four primary access models, but there is a fifth that is gaining interest, particularly in a cloud environment. This model is the Task-based Access Control model. Read through the TBAC (or find additional resources), then complete the following for each of the five models:
- Provide a brief description of the model.
- The method of information
- Provide a scenario where the model would be the optimal choice for access control, and why.
- Provide a scenario where the model is the least optimal choice for access control, and why.