Question Details

[solution] »

I want to send you this question, you answed the last one great. Has to be 150-250 words at least


Description

Answer Download


The Question

I want to send you this question, you answed the last one great. Has to be 150-250 words at least 2 sitation.  How would you limit the damage that one person could cause, by making sure that they have access only to what they need?


Running head: MANAGING ACCESS CONTROLS 1 Managing access controls

 

This is a situation that suits a role based access control environment. Therefore,

 

individuals that require authorization to access resources can be classified based on their access

 

requirements and their specific roles. Individual roles are a set of accesses that are required for a

 

given group either formed by internal employees or external vendors (Basta & Zgola, 2011). MANAGING ACCESS CONTROLS

 

2

 

Perfect control is possible because users are assigned permissions where auditing and handling

 

their changes is easy.

 

Permissions are an important component towards establishing security architecture from

 

where system user groups are authorized as well as computers? access to the network.

 

Permissions give room to every owner of the secured object such as the database to oversee and

 

control who performs an operation on the data set (Benantar, 2006). This is because it is up to the

 

owner?s discretion on who accesses and makes amends to the data set. The owner of the data set

 

also ensures that access mechanisms are fully defined for every party who is allowed access to

 

the data set.

 

It should be noted that permissions can be explicitly granted or implicitly denied. Every

 

permission that is granted by the object owner to a given group or user is normally stored as an

 

ACE under a discretionary access control list that falls under the security descriptor object. MANAGING ACCESS CONTROLS

 

3 References

 

Baker, T. (2009). Intelligence-led policing: leadership, strategies, and tactics. Flushing, NY:

 

Looseleaf Law Publications.

 

Basta, A. & Zgola, M. (2011). Database security. Boston, Mass: Course Technology.

 

Benantar, M. (2006). Access control systems: security, identity management and trust models.

 

New York: Springer Science+Business Media.

 


Solution details

Solution #000176213

[solution] »

I want to send you this question, you answed the last one great. Has to be 150-250 words at least.zip

Uploaded by: Tutor

Answer rating:

This paper was answered on 14-Oct-2020

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Oct 14, 2020

EXPERT

Tutor

ANSWER RATING

BEST TUTORS

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

STUCK WITH YOUR PAPER?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN A DEADLINE.

Order Now