EMERGING TRENDS IN COMPUTING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
AUTHORIZATION
|
|
AUTHENTICATION
|
|
SECURITY OF DATA
|
|
AUDITING
|
Detailed explanation-1: -DAC, RBAC, and MAC access control systems are models that have been used to create access control systems that provide reliability and security. Businesses with smaller applications will find DAC to be easier to implement. Others with highly confidential or sensitive information may decide to use RBAC or MAC systems.
Detailed explanation-2: -Role Based Access Control (RBAC) RBAC grants access based on a user’s role and implements key security principles, such as “least privilege” and “separation of privilege.” Thus, someone attempting to access information can only access data that’s deemed necessary for their role.
Detailed explanation-3: -Discretionary access control (DAC) A discretionary access control system, on the other hand, puts a little more control back into leadership’s hands. Rule-based access control. Identity-based access control. 09-Mar-2023