FUNDAMENTALS OF COMPUTER

DATABASE FUNDAMENTALS

CLOUD COMPUTING AND DATABASES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ REFERS TO DIGITALLY SPECIFY THE ACCESS RIGHTS TO PROTECTED RESOURCES USING ACCESS POLICIES
A
AUTHORIZATION
B
AUTHENTICATION
C
SECURITY OF DATA
D
AUDITING
Explanation: 

Detailed explanation-1: -This is an access control method in which owners or administrators of the protected system, data or resource set the policies defining who or what is authorized to access the resource. Many of these systems enable administrators to limit the propagation of access rights.

Detailed explanation-2: -DAC, RBAC, and MAC access control systems are models that have been used to create access control systems that provide reliability and security. Businesses with smaller applications will find DAC to be easier to implement. Others with highly confidential or sensitive information may decide to use RBAC or MAC systems.

Detailed explanation-3: -Authorization (access control) Access control mechanisms determine which operations the user can or cannot do by comparing the user’s identity to an access control list (ACL). Access controls encompass: File permissions, such as the right to create, read, edit or delete a file.

There is 1 question to complete.