Question Details

[solution] »

I want to send you this question, you answed the last one great. Has to be 150-250 words at least

Brief item decscription

Answer Download

Item details:

I want to send you this question, you answed the last one great. Has to be 150-250 words at least 2 sitation.  How would you limit the damage that one person could cause, by making sure that they have access only to what they need?

Running head: MANAGING ACCESS CONTROLS 1 Managing access controls


This is a situation that suits a role based access control environment. Therefore,


individuals that require authorization to access resources can be classified based on their access


requirements and their specific roles. Individual roles are a set of accesses that are required for a


given group either formed by internal employees or external vendors (Basta & Zgola, 2011). MANAGING ACCESS CONTROLS




Perfect control is possible because users are assigned permissions where auditing and handling


their changes is easy.


Permissions are an important component towards establishing security architecture from


where system user groups are authorized as well as computers? access to the network.


Permissions give room to every owner of the secured object such as the database to oversee and


control who performs an operation on the data set (Benantar, 2006). This is because it is up to the


owner?s discretion on who accesses and makes amends to the data set. The owner of the data set


also ensures that access mechanisms are fully defined for every party who is allowed access to


the data set.


It should be noted that permissions can be explicitly granted or implicitly denied. Every


permission that is granted by the object owner to a given group or user is normally stored as an


ACE under a discretionary access control list that falls under the security descriptor object. MANAGING ACCESS CONTROLS


3 References


Baker, T. (2009). Intelligence-led policing: leadership, strategies, and tactics. Flushing, NY:


Looseleaf Law Publications.


Basta, A. & Zgola, M. (2011). Database security. Boston, Mass: Course Technology.


Benantar, M. (2006). Access control systems: security, identity management and trust models.


New York: Springer Science+Business Media.


Notice: Undefined index: payment_status in /home/aceyourh/ on line 248

About this question:

This question was answered on: Oct 14, 2020

PRICE: $20 (18.37 KB)

Buy this answer for only: $20

This attachment is locked

We have a ready expert answer for this paper which you can use for in-depth understanding, research editing or paraphrasing. You can buy it or order for a fresh, original and plagiarism-free copy (Deadline assured. Flexible pricing. TurnItIn Report provided)

Pay using PayPal (No PayPal account Required) or your credit card. All your purchases are securely protected by PayPal.

Notice: Undefined variable: ip_country in /home/aceyourh/ on line 456

Need a similar solution fast, written anew from scratch? Place your own custom order

We have top-notch tutors who can help you with your essay at a reasonable cost and then you can simply use that essay as a template to build your own arguments. This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student. New solution orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

Order Now