Describe two common methods for achieving multilevel security


Two common methods for achieving multilevel security are the access control list (ACL) and role based access control (RBAC). The ACL method assigns privileges, such as the right to perform computer program procedures and access data files, directly to the individual. In large organizations with thousands of employees, this can become a considerable administrative burden as access needs constantly change with changes in job responsibilities. RBAC involves creating standard tasks (e.g., cash receipts processing) called roles. Each role is assigned access privileges to specific data and procedures, such as the right to add a record to the cash receipts journal. Once a role is created, individuals are assigned to it. Using this technique, individuals may be easily added or deleted from roles as their job responsibilities change. Individuals assigned to a particular role may not access program procedures and data that are not specified by that role.

Business

You might also like to view...

Coalitions usually remain intact after the successful resolution of their issue.

Answer the following statement true (T) or false (F)

Business

Which of the following is an example of a special request in advance of service delivery?

a. Dietary requirements b. Complaints c. Warranties d. Refunds e. Suggestions

Business

The source of the Statute of Frauds today is a federal statute

Indicate whether the statement is true or false

Business

In the valuation of Internet companies:

A. the replacement value approach plays a significant role. B. the book value approach is of primary importance. C. the factor approach is used the overall value. D. the qualitative portion of due diligence carries much more weight.

Business