Access controls-information security, Computer Network Security

Access Controls

Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control access are as follows

Mandatory access controls (MAC) – give offers limited control over access to information resources. Lattice based access control: variation of MAC; user’s assigned matrix of authorizations for the areas of access.
Nondiscretionary controls - managed by a central authority in organization; is based on individual’s role or a specified set of assigned tasks.
Discretionary access controls (DAC) - implemented at discretion/option of data user.

Posted Date: 10/8/2012 6:42:57 AM | Location : United States







Related Discussions:- Access controls-information security, Assignment Help, Ask Question on Access controls-information security, Get Answer, Expert's Help, Access controls-information security Discussions

Write discussion on Access controls-information security
Your posts are moderated
Related Questions
Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Digital Certificates Digital Certificates are electronic document having key value and identifying information about entity which controls key. Digital signature which is attach

The first and foremost need of  any business is a role to perform for its client base, and for the spammer this will typically be the role of advertising products which, due to the

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

on LAN,where are IP datagrams transported?

IPv6 ADDRESSING IPv6 has 128-bit addresses. A 128-bit address adds network prefix and host suffix. An benefit of IPv6 addressing is that there is address classes i.e. prefix/s