Discussion: Application Security

User Generated

xhznequbaqv2123

Computer Science

Description

  • Research the Internet on the various aspects of an access control policy.
  • Explain the need for designing procedures for simple tasks such as creating or modifying access controls.
  • Create a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.
  • Design the procedures for collecting and storing documented access control changes.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hello buddy, here you go. please remember to review me

Running head: APPLICATION SECURITY

Application Security
Student’s Name
Affiliate Institution

1

APPLICATION SECURITY

2
Application Security

Aspects of an Access Control Policy
An access control policy consists of four aspects namely; the access groups, resource
groups, action groups and relationship (Wallerstorfer, 2010). Access groups refer to the users
whom the policy is applied to. Resource groups can be described as the resources which the
policy is set to control. A resource group may be inclusive of business objects such as contracts
or commands that are related. For instance, commands that users in a particular function can
execute. Action groups refer to the actions executed by a user on the resources. Finally, a
relationship can be optional. For instance, every resource class may possess a set of relationships
linked to it. Every resource may have users fulfilling every relationship.
Need for designing pr...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags