answersLogoWhite

0


Best Answer

RBAC

Fingerprint Access Control System - TTAC01 model we are implementing it has a strictness entrance to a property, a building, or a room to authorized persons.

Features Of Access Control : - # Eliminates administrative costs pertaining to conventional swipe cards and ID cards

# Fingerprint matching with quick, accurate

# Available for users up to 500/1000/1500

# Can record up to 30,000 transactions

User Avatar

Wiki User

7y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago

The choice of access control model depends on what you are trying to achieve.

For example:

Mandatory access control (MAC) should protect information no matter who the user is. They can't change it's classification or who is granted access to it.

Discretionary access control (DAC) allows the information owner maximum flexibility in granting or revoking permissions for the information and applications.

Role-based access control (RBAC) allows users to be assigned pre-defined sets of permissions based on what they will need to do so that it is not necessary to craft access policies for each individual user. RBAC can also be combined with MAC as an access control model.

There are, of course, other access control models. The point is, that you have to first define your objectives before you can decide which model you should implement.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which access control model are you implementing?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

With the discretionary access control model the most common control implementation is through?

access control lists


What functionality do access control lists provide when implementing dynamic NAT on a Cisco route?

which addresses are to be translated


What is the least restrictive access control model?

yes


What are some ways to implement controlled access?

Implementing access control is a very important aspect for any system. It will insure that only authorized users can access the system. To do it you must go through authorization and authentication.


Which access control model allows the owner of the resource to choose who can access the resource?

Discretionary access controlnswer Explanation: The discretionary access control (DAC) model permits the owner of a resource to identify the users who can access the resource. You become the owner of the resource by either creating the resource or by being granted ownership of that resource. You grant access to the resources using access control lists (ACLs).


Who is responsible for establishing access permissions to network resources in the DAC access control model?

the owner of the resource.


Which access control model involves classifying each user and resource and assigning a security level to each classification?

Mandatory Access control (MAC)


When implementing secure network administration principles what is configured to restrict a subnet from transmitting FTP traffic to a particular server across the network?

Access control list


Which access control model should you use to grant access to resources in order to ensure the highest level of security?

MAC


Which design pattern is used to decoupled presentation from core data access functionality?

Model-View-Control


What layer of the OSI model are the Media Access Control addresses part of?

Layer 2 data link layer


What is Best policy model gun control?

There is no "best" policy. You can't legislate behavior by restricting access to an object.