Access over 35 million academic & study documents

Access Control

Content type
User Generated
Subject
Cyber Security
School
Saudi electronic university
Type
Homework
Rating
Showing Page:
1/4
1
Access Control Methods
Student's Name:
Institutional Affiliations:
Due Date:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
2
Access Control Methods
Access control is an essential mechanism that ensures that confidential data such as
intellectual property, customer data, and personally identifiable data remains safe. It is an
important element that uses numerous strategies in continuously verifying access to an
organization's network system. This implies that without deploying robust access control
measures, a company's external and internal resources will be at risk of being leaked. Access
control approaches are normally used to identify humans or users and allow or authorize the
subject to access resources or data depending on a specific task. Usually, access control
mechanisms identify users using several login credentials such as security tokens, biometric
scans, PINs, passwords, and usernames. There are four main access control methods:
discretionary access control (DAC), which restricts objects based on the subjects' identity or the
particular group. It is usually implemented based on the access control list, which includes the
names of users who can access certain resources and have the authority to update or read the
resources. The main advantage of the DAC, access control method is that security administrators
are the only individuals with the permission to define each object's profile, such as a group of
resources or a resource, and update each profile's control list. However, the main disadvantage of
this strategy is that it is discretionary where subjects can manipulate it because the security
personnel and resource owners can identify those accessing the resources and with which
authority (Russell, 2019).
Another access control method is Role-based Access Control (RBAC). This type of
access control is practised based on the user's discretion. Administrators usually use it when
assigning tasks based on the company's roles rather than the individual user accounts in a given
organization. The main advantage of the role-based access control method is that it leads to the

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
1 Access Control Methods Student's Name: Institutional Affiliations: Due Date: 2 Access Control Methods Access control is an essential mechanism that ensures that confidential data such as intellectual property, customer data, and personally identifiable data remains safe. It is an important element that uses numerous strategies in continuously verifying access to an organization's network system. This implies that without deploying robust access control measures, a company's external and internal resources will be at risk of being leaked. Access control approaches are normally used to identify humans or users and allow or authorize the subject to access resources or data depending on a specific task. Usually, access control mechanisms identify users using several login credentials such as security tokens, biometric scans, PINs, passwords, and usernames. There are four main access control methods: discretionary access control (DAC), which restricts objects based on the subjects' identity or the particular group. It is usually implemented based on the access control list, which includes the names of users who can access certain resources and have the authority to update or read ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4