What methods would you use to verify that the choice of access controls is appropriate for this user?

What methods would you use to verify that the choice of access controls is appropriate for this user?

Determining access controls

“Authorization functions” is a process by which access to a particular IT asset can be granted or denied, while access control is used to enforce the rules for authorization. There are several access control models, including “role-based” AC, “discretionary” AC, “mandatory” AC, and “attribute-based” AC. Imagine that, as the security administrator for a medium-sized retail-based organization with around 2000 users, you are tasked with determining the appropriate level of access for a new user in the Human Resources department. What approach would you take to determine access for this person? What methods would you use to verify that the choice of access controls is appropriate for this user?


Price: £ 45

100% Plagiarism Free & Custom Written, Tailored to your instructions

Leave your Comments


Can't read the image? click here to refresh