Access controls-information security, Computer Network Security

Access Controls

Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control access are as follows

Mandatory access controls (MAC) – give offers limited control over access to information resources. Lattice based access control: variation of MAC; user’s assigned matrix of authorizations for the areas of access.
Nondiscretionary controls - managed by a central authority in organization; is based on individual’s role or a specified set of assigned tasks.
Discretionary access controls (DAC) - implemented at discretion/option of data user.

Posted Date: 10/8/2012 6:42:57 AM | Location : United States







Related Discussions:- Access controls-information security, Assignment Help, Ask Question on Access controls-information security, Get Answer, Expert's Help, Access controls-information security Discussions

Write discussion on Access controls-information security
Your posts are moderated
Related Questions
#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat


ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which