COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
yes
|
|
no
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Three main types of access control systems are: Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC).
Detailed explanation-2: -There are five main access control systems or models defined under different terms. Generally, the choice of models includes role-based access control, rule-based access control, discretionary access control, mandatory access control, and attribute-based access control.
Detailed explanation-3: -In its simplest form, access control involves identifying a user based on their credentials and then authorizing the appropriate level of access once they are authenticated. Passwords, pins, security tokens-and even biometric scans-are all credentials commonly used to identify and authenticate a user.