Organizations have various options when it comes to access control techniques. T
ID: 3667083 • Letter: O
Question
Organizations have various options when it comes to access control techniques. The common access control models include discretionary access control (DAC), mandatory access control (MAC), and role-based access control (RBAC). Over the last five years, there has been a rapid growth in user-authentication technologies. As hackers have become more intelligent in breaking a system, more efficient authentication techniques are necessary.
Based on what you have learned so far, answer the following questions:
Explain the differences between DAC, MAC, and RBAC.
Which model would you suggest an organization should implement? Why?
When would you use one model over the other? Provide a rationale in support of your answer.
Choose three authentication techniques and discuss their advantages and disadvantages. What are the different situations in which you suggest the use of each of the three authentication techniques? Provide rationale to support your answer.
What are the common types of unauthorized access and security concerns, of having a wireless network?
Do you think the reward associated with wireless networks is more than the risk? Why or why not? Provide rationale in support of your answer
Explanation / Answer
Ans1- Rbac is rolebased access control is an approach to restricting system access to autrozied users.
DAC as a means of restricting access to objects based on the identity of subjects to which theybelong.means control are discreationary in sense that a subject with a certain access permission is capablr of passing that permission on to another subjects DAC refers to one category of access control that subject can transfer among each other
Mac refers to second category of access controls that imposes constraint upon the first
Organisation should implement Rbac access control model becaude it provide restricting access..provide security to unauthorized user
Ans2
The first type of authentication is accepting proof of identity given by a credible person who has first-hand evidence that the identity is genuine.
The second type of authentication is comparing the attributes of the object itself to what is known about objects of that origin.
The third type of authentication relies on documentation or other external affirmations. In criminal courts, the rules of evidence often require establishing the chain of custody of evidence presented.
Ans3 password gussing
Password cracking
Remote access
Brute force attack
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.