Discussion#3
docx
keyboard_arrow_up
School
American Public University *
*We aren’t endorsed by this school
Course
422
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
1
Uploaded by PresidentRiverWasp4
Access control is a data security process allowing organizations and administrators the power to authorize individuals to their data and resources. The secure control verifies users for who they are and ensures control access levels are appropriately granted to the users. Users are identified by the access control to be granted the appropriate privileges, as well as granting access to physical buildings and devices. The components that are used in access control are authentication establishing initial identity of user, authorization is an extra layer of security, access granting privileges, manage organizes authentication and authorization, and audit gathers information from users for possible violations.
There are four different types and parts to access control, Mandatory Access Control (MAC), Role-
Based Access Control (RBAC), Discretionary Access Control (DAC), and Rule-Based Access Control (RBAC or RB-RBAC). These are access control modules that give organizations power to grant user permissions and enforce access policies, chosen by access needed by the user, security, infrastructure, etc. MAC gives only the owner and custodian management of the access control, which means other users lack permission to edit or grant the access controls. A RBAC is a module that grants permissions to individuals based on the position they fill within the organization. The DAC
module allows a user control over any objects they own as well as programs utilizing them, the least restrictive model. Whereas the RB-RBAC that dynamically assigns roles that is based on settings set by the custodian or system administrator.
SSO or Single Sign-on, is a system property which enables users to use one set of username and password, once authenticated, gain access across a wide range of applications.
References
“What Is Access Control? - Network Cybersecurity Systems.” Fortinet, 2023, www.fortinet.com/resources/cyberglossary/access-control#:~:text=Access%20control
%20is%20a%20data
.
Hoffman, Barbara. “Access Control Models and Methods | Types of Access Control.” Delinea, delinea.com/blog/access-control-models-methods#:~:text=There%20are%20four
%20types%20of
.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help