Question

In: Computer Science

Principles of Information Security Using about 1000 words Explain in detail discretionary access controls (DACs) and...

Principles of Information Security

Using about 1000 words Explain in detail discretionary access controls (DACs) and nondiscretionary access controls (NDACs)

Solutions

Expert Solution

Principles of Information Technology

  1. Confidentiality
  2. intigrity
  3. availability

Confidentiality

  • Confidentiality means protecting information from being accessed by unauthorised parties
  • unauthorised users cannot access any information only the authorised can view personal data.
  • Secure information must remain secret and confidential at all times. When security breaches do happen, they cause irreparable damage.
  • A breach is when a person has access to data that they shouldn’t have. If there is a leak of an email address, phone number or credit card account number, there are very few ways to protect yourself.

Integrity

  • integrity refers to the nature of the secure information itself. Data should be accurate, up-to-date and trustworthy in the service a business provides.
  • Only authorised employees should make alterations to the data.
  • In addition, if a mistake was made during an edit, there should be fail-safe measures to reverse the damage.
  • All information technology is vulnerable to human error, which is perfectly natural. Therefore, businesses need policies in place to protect security information .this principle also covers a physical computer hardware network. This is because “computer hardware may render data incorrectly or incompletely, limit or eliminate access to data, or make information hard to use”.

Availability

  • availability is simply how easy it is to access data on a daily basis.
  • A high availability is good for businesses, as they can readily access and process information.
  • Both hardware and software pose risks to availability.
  • If hardware problems occur, data cannot be accessed. Furthermore, software maintenance should be minimal to avoid long downtime.
  • One availability attack is a Distributed Denial of Service (DDoS).
  • This means that criminals deny information security by bringing down servers. As a result, neither customers nor employees can access data, even though they are authorised to. Overall, DDoS attacks are becoming common.
  • Apple Microsoft, Google and Sony suffering from this DDOS attacks

Discretionary Access Control

  • In Discretionary Access Control (DAC) user can have a control access to their own data.
  • DAC is typically the default access control mechanism for most desktop operating systems.
  • Each resource object on a DAC based system has an Access Control List (ACL) associated with it.
  • An ACL contains a list of users and groups to which the user has permitted access together with the level of access for each user or group.
  • For example, User P may provide read-only access on one of her files to User Q, read and write access on the same file to User R and full control to any user belonging to Group 1.
  • It is important to note that under DAC a user can only set access permissions for resources which they already own.A hypothetical User P cannot, therefore, change the access control for a file that is owned by User Q. User P can, however, set access permissions on a file that she owns.
  • Under some operating systems it is also possible for the system or network administrator to dictate which permissions users are allowed to set in the ACLs of their resources.
  • Discretionary Access Control provides a much more flexible environment than Mandatory Access Control but also increases the risk that data will be made accessible to users that should not necessarily be given access.

Non discretionary Access Control

  • Non discretionary Access Control also known as Role Based Access Control (RBAC) .
  • it takes more of a real world approach to structuring access control. Access under NDAC is based on a user's job function within the organization to which the computer system belongs.
  • Essentially, NDAC assigns permissions to particular roles in an organization. Users are then assigned to that particular role.
  • Roles differ from groups in that while users may belong to multiple groups, a user under NDAC may only be assigned a single role in an organization.
  • Additionally, there is no way to provide individual users additional permissions over and above those available for their role.


Related Solutions

Principles of Information Security Using nothing less than 1000 words explain in detail risk control. List...
Principles of Information Security Using nothing less than 1000 words explain in detail risk control. List and describe the five selecting control strategies for controlling risk.
Principles of Information Security Using about 1000 words List and describe which members of an organisation...
Principles of Information Security Using about 1000 words List and describe which members of an organisation are involved in the security systems development life cycle. Who leads the process?
Principles of Information Security Using about 1000 words Describe the three simplistic stages of Lewin’s change...
Principles of Information Security Using about 1000 words Describe the three simplistic stages of Lewin’s change management model.
Principles of Information Security Using nothing less than 1000 words Identify and explain the six components...
Principles of Information Security Using nothing less than 1000 words Identify and explain the six components of an information system. Which are most directly affected by the study of computer security? Which are most associated with its study?
Explain discretionary access controls (DACs) and nondiscretionary access controls (NDACs) (30 marks)
Explain discretionary access controls (DACs) and nondiscretionary access controls (NDACs)
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words,...
ACCESS CONTROLS Security Policies / Enterprise Security Strategy Plan Instructions: In NO LESS than 200 words, answer the following question. Create an outline that could serve as a template for creating future security policies for an IT Network's Access Controls. Your template should reflect 2–3 key parts of a security policy related to intranet operations. For each element you include in your outline template, give two sentences describing the information that should be included. It is acceptable if you want...
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and...
Using about 1000 words or more explain in depth the difference between a denial-of-service attack and a distributed denial-of-service attack. Research real life stories of the two attacks that happened to a company (or companies) or individuals etc.
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to...
1. T/F. Under non-discretionary access control, a third-party security administrator determines what users have access to certain network and system resources. 2. T/F. When establishing firewall rules, the most prudent configuration is to implicitly deny by blocking all traffic by default then rely on business need and justification to create new rules as exceptions. 3. T/F. By default, all virtual private network (VPN) client software encrypts network traffic. 4. T/F. Asymmetric encryption is more secure than symmetric encryption.
Explain in detail Multilevel Structural Equations Modelling. Discuss your answer in 1000 words
Explain in detail Multilevel Structural Equations Modelling. Discuss your answer in 1000 words
Authentication and Access Controls Security enhancements designed to require users to present two or more pieces...
Authentication and Access Controls Security enhancements designed to require users to present two or more pieces of evidence or credentials when logging into an account is called multi-factor authentication. Legislation and regulations such as The Payment Card Industry (PCI) Data Security Standard requires the use of MFAs for all network access to a Card Data Environment (CDE). Security administrators should have a comprehensive understanding of the basic underlying principles of how MFA works. 1. Define all four factors of multifactor...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT