Access Millions of academic & study documents

Access Control

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/5
Running head: ACCESS CONTROL 1
Access control
.Name
Tutor
Institution
Course
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
ACCESS CONTROL 2
Article1 web
Techotopia (2016). Mandatory, Discretionary, Role and Rule Based Access Control
http://www.techotopia.com/index.php/Mandatory,_Discretionary,_Role_and_Rule_Bas
ed_Access_Control
Discretionary access controls (DAC) and Mandatory access control (MAC) are user
access controls. In MAC and DAC the term access control describes the access to system
objects and data after a user’s account credentials have been verified and access to the system
granted. Also, users can be granted access to some files after logging in the system while they
may also be denied access to others.
MAC is stricter than other access controls and was originally created for government
use. In MAC the user’s accessibility is organized in a hierarchical order and all data is
controlled by settings from the operating system and administrator. Although MAC is the most
secure system, it requires high system management characterized by constant updates on the
object and account labels and incorporation of new users. In most desktops, DAC is a default
access control system. The control in DAC is based on access Control List. Therefore the file
owner can allow access of one kind to one user and a different one for another. However a user
can only set access permission to only those files that they own. Therefore the system is
flexible for users. It may however increase the risk of data being access by other people who
should not have access.
Article 2. web.
Access & Identity, (2015) Bonus Publication: Access Control Trends & Technology 2015.
Security info watch.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: ACCESS CONTROL 1 Access control .Name Tutor Institution Course Date ACCESS CONTROL Article1 web Techotopia (2016). Mandatory, Discretionary, Role and Rule Based Access Control http://www.techotopia.com/index.php/Mandatory,_Discretionary,_Role_and_Rule_Bas ed_Access_Control Discretionary access controls (DAC) and Mandatory access control (MAC) are user access controls. In MAC and DAC the term access control describes the access to system objects and data after a user’s account credentials have been verified and access to the system granted. Also, users can be granted access to some files after logging in the system while they may also be denied access to others. MAC is stricter than other access controls and was originally created for government use. In MAC the user’s accessibility is organized in a hierarchical order and all data is controlled by settings from the operating system and administrator. Although MAC is the most secure system, it requires high system management characterized by constant updates on the object and account labels and incorporation of new users. In most desktops, DAC is a default access control system. The control in DAC is based on access Control List. Therefore the file owner can allow access of one kind to one user and a different one for another. However a user can only set access permission to only those files that they own. Therefore the system is flexible for users. It may however increase the risk of data being access by ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents