Access controls-information security, Computer Network Security

Access Controls

Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control access are as follows

Mandatory access controls (MAC) – give offers limited control over access to information resources. Lattice based access control: variation of MAC; user’s assigned matrix of authorizations for the areas of access.
Nondiscretionary controls - managed by a central authority in organization; is based on individual’s role or a specified set of assigned tasks.
Discretionary access controls (DAC) - implemented at discretion/option of data user.

Posted Date: 10/8/2012 6:42:57 AM | Location : United States

Related Discussions:- Access controls-information security, Assignment Help, Ask Question on Access controls-information security, Get Answer, Expert's Help, Access controls-information security Discussions

Write discussion on Access controls-information security
Your posts are moderated
Related Questions
Information and Network Security Part 1- Recovery of an encrypted `word' using a forward search attack. Complete and correct summary for part 1. Adequately commented, clea

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?