answersLogoWhite

0


Best Answer

the owner of the resource.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Who is responsible for establishing access permissions to network resources in the DAC access control model?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

Which layer is responsible for flow control with sliding windows and reliability with sequence numbers and acknowledgements?

Transport layer


In the transmission control protocol internet protocol architecture what layer is responsible for routing and delivering data packets?

internet


Which access control model are you implementing?

RBACFingerprint Access Control System - TTAC01 model we are implementing it has a strictness entrance to a property, a building, or a room to authorized persons.Features Of Access Control : - # Eliminates administrative costs pertaining to conventional swipe cards and ID cards# Fingerprint matching with quick, accurate# Available for users up to 500/1000/1500# Can record up to 30,000 transactions


How do you remove administartor?

To remove an administrator permissions from an account on a Windows computer, they can be found under; Control Panel->User AccountsX2. Then select the account you want to modify, and click *Change account type*. To remove the account completely, Do as before, only select Delete/Remove.


What is difference between user privileges and permission?

As the question was posed in the Windows section, I'll answer this from Microsoft's perspective. User rights generally refer to logon capabilities: who can logon interactively, as a batch job, as a service, over the network, over Terminal Services, etc. These all require a certain "right" and these rights can also be denied to groups or individual users. Permissions relate to the capability of accessing an object, such as a file, a registry entry, a service, a printer, a share, etc. Again these can be granted or denied but there is more granularity here as there are several permission types: read, write, delete, etc. Permissions are collected into Access Control Lists (ACLs) with each entry being termed an Access Control Entry (ACE). To complete the trio in common parlance, there are privileges. These relate to overriding capabilties within Windows such as backup, restore, take ownership, debug, etc. If you hold the backup privilege, for example, you are allowed to read all files, regardless of permissions on those files. Privileges trump permissions. Confusingly, privileges are sometimes referred to as rights, even in official MS documentation. in the days of NT4, some were also called "abilties" so you'll note the careful use of the generic term, "capability" above. And finally, in the Novell world, permissions are called user rights.

Related questions

Who is responsible for establishing a private company's internal control?

management


Gamal Abdel Nasser's seizure of the Suez Canal continued his policy of?

Establishing national control of vital Resources


What is the use of User accounts and Groups?

User accounts and groups are useful for determining who can access various resources on a network. There may be a large number of files and folders that certain individuals should be able to modify and which others should be able to read but not be allowed to change. Assigning permissions to individual users allows a network administrator to control who can read or modify certain files and folders. They can also be used to control access to other network resources, such as printers. Assigning individual permissions to large numbers of people where large numbers of network resources exist can be time consuming. This is where groups are useful. Rather than setting each individual's permissions for each network resource, the group is set permissions, then users are assigned as members of groups. In this way the group permissions can be modified as network resources change and users can be moved from one group to another (or be made members of multiple groups) which will save time and reduce mistakes.


How does one get access to a control list?

An access control list in a list of permissions, with respect to a computer filing system, that is attached to an object. They are usually accessed from a table in an operating system which hold these permissions and can vary.


What permissions would User1 have to the SalesData folder if the user were accessing the folder across a network connection?

1. User1 should have Full Control permission on SalesData over the network (as well as locally). Their effective NTFS permissions are Full Control because this is the cumulative effect of Modify and Full Control permissions. Plus, they are given Full Control share permission, meaning the most restrictive combination of share and NTFS is still Full Control.


European nations were NOT satisfied with establishing free trade with Africa and Asia during the era of imperialism because?

european nations wanted monopoly control of markets and resources.


What is the minimum standard NTFS permission required for viewing the ownership and permissions and attributes of a file?

Full Control is needed to change attributes and or permissions of a NTFS folder.


What type of permissions control access to folders over a network?

Share Permission


What permissions and licenses are required by Colgate to manufacture toothpaste in India?

Control pollution


What is a collection of individual permissions in the form of access control entries?

The ACL (Access Control list) has the individual ACE entries.


How can you implement access control to PII files?

encryption, passwords, authorization, network permissions


Are all permissions stored in the access control list of the element being protected?

false