Discuss the below:
In order to secure the network and restrict access to sensitive information, what user groups would you create to implement the following rules?
a. Each department has full access to its own information.
b. The Administration department has read/write access to accounting information.
c. The Marketing department should have read-only access to the Manufacturing department information
d. Administration has read-only access to all information.
e. Manufacturing has access to manufacturing information, but no other files in an other department.
f. Accounting has read-only access to marketing information.