Use the study materials and engage in any additional research needed to fill in knowledge gaps.
Write a 4–6page paper that covers the following topics:
Describe your lab experiences related to access controls and authentication systems available for use in organizations to protect information assets.
Analyze the security characteristics of commonly used file systems.
Explain how access control lists play a role in a layered network security strategy.
Explain the security benefits available through domain separation, process isolation, resource encapsulation, and least privilege