In: Computer Science
which access control best describes the following scenario. your boss asked you to modify the files and send them to him one hour. when you log into the system to find the following message. The error states that a user does not have permission to access this file contact your system administrator the error is an example of which the access control model is it
a)Access Control Matrix
b)Physical Acess Control
c)Discretionary access control
The correct answer after the analysis of scenario is Discretionary Access control here.
here you can easily understand why we go with discretionary access control.
According to the Trusted Computer Assessment Criteria, optional get to control is “a implies of limiting get to to objects based on the character of subjects and/or bunches to which they have a place. The controls are optional within the sense that a subject with certain get to authorization is able of passing that authorization (maybe in a roundabout way) on to any other subject (unless limited by required get to control)”.
DAC (discretionary access control) gadgets utilize client distinguishing proof methods to distinguish and confine protest get to. Confirmation accreditations such as username and watchword are confirmed some time recently get to is allowed. This sort of get to control is profoundly adaptable in terms of information control. It gives you room to customize get to arrangements concurring to each end user. Get to is studied and composed to each client employing a single record.Optional get to control is simple to utilize. It permits simple policing and giving authorizations for each get to point. The complexity of get to control is minimized to realize way better administration of the network's assets.
the main purpose of DAC is to secure the data privillige It is inconceivable for an organization to physically screen each get to endeavor into their arrange. This would be a major deplete of time and cash for the commerce or organization. Optional get to control computerizes the security observation framework. Get to focuses are checked from a centralized stage to check and verify people attempting to get to imperative records.
A optional get to point is an imaginative security convention that gives a tall level of security to information systems of organizations. The organization taken a toll minimization, quick verification, ease of utilize and customizable highlights it profits to organizations makes it a profoundly productive get to control apparatus.