Briefly describe authorization.

What will be an ideal response?


Authorization picks up where authentication leaves off. After a user is authenticated, the authorization system uses access-control technologies to implement the second phase of protecting resources. It determines if an authenticated user has the correct authorization to access a resource. Authorization enforcement can come in one of two ways: total denial of access to unauthorized users or limiting the extent of access provided to an authorized user. As in authentication, multiple schools of thought have been developed to support authorization over the years.

Computer Science & Information Technology

You might also like to view...

____ are used to decide the risk acceptance, risk avoidance, risk transference, or risk mitigation approach that will be used to ensure each asset against risk.

A. Exceptions B. Costs C. Benefits D. Tradeoffs

Computer Science & Information Technology

Use the ________ element to associate JavaScript with a web page.

a. object b. script c. embed d. canvas

Computer Science & Information Technology

The C statement that would store three integers keyed in by the user in the type int variables n1, n2, and n3 is ________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Find a Web page that’s a “wall of words” (long paragraphs with little or no formatting) and reformat it so that it supports scanning.

What will be an ideal response?

Computer Science & Information Technology