answersLogoWhite

0

You can control an ASPnet page to where only users can access it by going to the white list. This regulates the access to only users assigned by the administrator.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

You are designing network access control so that remote users are limited to accessing the network during normal business hours only. Policies regarding user access apply to all users.?

Rule-based Access Control


What is identity and access management used for?

Identity and access management are IT security services which businesses use to control the amount of information which is accessable to users. Access can be tailored to individual users and information, and enables control not only of a user's level of access, but of what the user is capable of using the company's information for once access has been granted.


What is RBACL?

RBACL stands for a role-based access control list. It is a way to restrict access to a system or computer network to authorized users only. You can assign users specific roles using RBACL.


Which type of permission should you set to control access to files and folders by local and network users?

NTFS on NTFS volumes only


Which characteristic of information is guarded by access control?

Access control primarily guards the confidentiality of information. It ensures that only authorized individuals have the ability to view or access sensitive data, protecting it from unauthorized disclosure. Additionally, access control can also support integrity and availability by regulating who can modify or delete information and ensuring that resources are available only to legitimate users.


Which group has read-write access only on its own folders read-only access to most system folders and no access to other users data?

Limited Users


What are some ways to implement controlled access?

Implementing access control is a very important aspect for any system. It will insure that only authorized users can access the system. To do it you must go through authorization and authentication.


What is access control entity?

An access control entity refers to any component within a system that manages and enforces policies regarding who can access specific resources or data. This can include users, groups, roles, and permissions that define the level of access granted. Access control entities work together to ensure that only authorized individuals can interact with sensitive information or systems, thereby enhancing security and compliance.


Categories of users of DBMS?

In DBMS you can have users who have only select access or with only select+update+insert access or with select+update+insert+delete access. These users may or may not be granted permissions to alter the table schema. Also you can have administrators who can create/modify/delete tables


How do you identify the ways could authorize users on a system?

allowing a resources owner to add new users to an ACL assigning credential levels to users and resources to ensure only users with appropriate credentials can access a resource assigning roles to users that determine the resources they can access


What Allows users and applications to access a company and data.?

Access to a company's data and applications is typically facilitated through authentication and authorization mechanisms. These include user credentials, such as usernames and passwords, as well as multi-factor authentication for enhanced security. Additionally, access control measures like role-based access control (RBAC) ensure that users can only access the data and applications necessary for their roles, thereby protecting sensitive information. Secure network protocols and virtual private networks (VPNs) further enable safe access to company resources.


Which security design goal ensures that only authorized users can access data?

Confidentiality