Access controls-information security, Computer Network Security

Access Controls

Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control access are as follows

Mandatory access controls (MAC) – give offers limited control over access to information resources. Lattice based access control: variation of MAC; user’s assigned matrix of authorizations for the areas of access.
Nondiscretionary controls - managed by a central authority in organization; is based on individual’s role or a specified set of assigned tasks.
Discretionary access controls (DAC) - implemented at discretion/option of data user.

Posted Date: 10/8/2012 6:42:57 AM | Location : United States

Related Discussions:- Access controls-information security, Assignment Help, Ask Question on Access controls-information security, Get Answer, Expert's Help, Access controls-information security Discussions

Write discussion on Access controls-information security
Your posts are moderated
Related Questions
VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

In this section, you should create a program that emulates a GBN node. Two GBN nodes will be running to send packets to each other through the UDP protocol. For emulation purpose,

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

(a) Describe RSA encryption. (b) For an RSA encryption the values of the primes are: p=29, q=31. select e=11, evaluate the public and private keys. (c) How can RSA be used fo

Improving domain blacklisting: Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

INFORMATION CLASSIFICATION The classification of information is an important aspect of policy and a control for the information protection. A clean desk policy stipulates that a

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat