answersLogoWhite

0


Best Answer

access control lists

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: With the discretionary access control model the most common control implementation is through?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is Non discretionary access control?

Non-discretionary access control is when the overall system administrator (or a single management body) within an organization tightly controls access to all resources for everybody on a network. Think of discretionary access controls like a democratic country. Everyone has their say as to who can do what in their country. Non-discretionary access control, on the other hand, is like dictatorship/communism. Only the government can specify what can or cannot be done.


Which access control model allows the owner of the resource to choose who can access the resource?

Discretionary access controlnswer Explanation: The discretionary access control (DAC) model permits the owner of a resource to identify the users who can access the resource. You become the owner of the resource by either creating the resource or by being granted ownership of that resource. You grant access to the resources using access control lists (ACLs).


Which access control model are you implementing?

RBACFingerprint Access Control System - TTAC01 model we are implementing it has a strictness entrance to a property, a building, or a room to authorized persons.Features Of Access Control : - # Eliminates administrative costs pertaining to conventional swipe cards and ID cards# Fingerprint matching with quick, accurate# Available for users up to 500/1000/1500# Can record up to 30,000 transactions


How can you control the access to a system?

You can control the access to a system by buying or downloading certain programs. An example of a program that gives you the ability to control the access to a system is Network Access Control.


A stateful firewall uses what type of access control?

Context-dependent access control

Related questions

What type of access control is determined by configuring an access control list or ACL?

Discretionary Access Control


What is Discretionary Access Control?

Non-discretionary access control is when the overall system administrator (or a single management body) within an organization tightly controls access to all resources for everybody on a network. Think of discretionary access controls like a democratic country. Everyone has their say as to who can do what in their country. Non-discretionary access control, on the other hand, is like Dictatorship/communism. Only the government can specify what can or cannot be done.


What is Non discretionary access control?

Non-discretionary access control is when the overall system administrator (or a single management body) within an organization tightly controls access to all resources for everybody on a network. Think of discretionary access controls like a democratic country. Everyone has their say as to who can do what in their country. Non-discretionary access control, on the other hand, is like dictatorship/communism. Only the government can specify what can or cannot be done.


Restricting access to files based on the indentity of the user or group is an example of which on what?

DAC - Discretionary Access Control.


Which access control model allows the owner of the resource to choose who can access the resource?

Discretionary access controlnswer Explanation: The discretionary access control (DAC) model permits the owner of a resource to identify the users who can access the resource. You become the owner of the resource by either creating the resource or by being granted ownership of that resource. You grant access to the resources using access control lists (ACLs).


What is the difference between a Discretionary Access Control List DACL and a System Access Control List on Microsoft Windows systems. What access permissions can be assigned to a file in Windows 7.?

cool nice cool


What are advantage of access control list?

An access control lists specifies the various users and what level of access they have. If you activate an access control list in a application, the various components of the application will be accessed based on the level of access permitted to them and the access level specified in the access control list for the currently logged in user.


What functionality do access control lists provide in the implementation of dynamic NAT on a Cisco router?

defines which addresses can be translated


How can you reduce the risks in access control?

Good question - access control must be carefully audited, before and after implementation. You don't want to give someone too much access if their job or position does not require it, and too little for others so that they can't do their job appropriately.


What is the meaning of biometric access control?

Biometric access control is access control where the identification process is made through biometric parameters. Some other researchers refer to it as the identification of humans by their characteristics or traits.


What is the Cdacl in c plus plus?

It's a wrapper for a discretionary access control list (DACL) structure. It is not part of the C++ standard, it's a Microsoft-specific class. Consult the MSDN for more information.


What is the difference between discretionary and mandatory access control?

In the most common implementations of Discretionary Access Control, users "own" their directories and the files and programs they contain. They can grant and deny access and execution privileges for these to other users. Users can also be parts of groups. They may be able grant or restrict access to all members of a group.In Mandatory Access Control the operating system controls the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. The object or target can be something like a process, a file, a directory, a program, or a memory segment. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernal compares these security attributes to the policy and decides whether the access or operation will be allowed. With mandatory access control, this security policy is centrally controlled by a security policy administrator; users do not have the ability to override the policy and, for example, grant access to files that would otherwise be restricted.