This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:46:06 GMT -06:00https://www.coursehero.com/file/73351395/Access-Control-Plandocx/ Running head: Access Control PlanMichael WilsonGrand Canyon University: ITT - 307November 17, 2019 1This study source was downloaded by 100000859819779 from CourseHero.com on 02-16-2023 14:46:06 GMT -06:00https://www.coursehero.com/file/73351395/Access-Control-Plandocx/Access Control PlanAccess Control Plan When operating a company is important to make sure that the users can access the files needed to perform their tasks. At the same time, we do not want them viewing or editing files that they should not be able to. This is why an access control plan is needed to alleviate some of those issues as well as increase network security. My plan would be based mainly on the Role Based Access Control plan, meaning that users would assign a specific role in the company and that role has certain permissions associated with them.My plan would include multiple levels of authentication and authorization. Using the role-based model for my plan. The goal with this plan is to create a secure network that allows users to efficiently complete their tasks within the organization. We want to project our resourcesboth physical and logical. This begins by limiting access to our hardware by only allowing authorized individuals