SOFTWARE ENGINEERING

EMERGING TRENDS IN SOFTWARE ENGINEERING

CLOUD COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ REFERS TO DIGITALLY SPECIFY THE ACCESS RIGHTS TO PROTECTED RESOURCES USING ACCESS POLICIES
A
AUTHORIZATION
B
AUTHENTICATION
C
SECURITY OF DATA
D
AUDITING
Explanation: 

Detailed explanation-1: -DAC, RBAC, and MAC access control systems are models that have been used to create access control systems that provide reliability and security. Businesses with smaller applications will find DAC to be easier to implement. Others with highly confidential or sensitive information may decide to use RBAC or MAC systems.

Detailed explanation-2: -Access authorization is a process through which the operating system determines that a process has the right to execute on this system. The most common form of this control is the user name, which we are all familiar with when we log on to a computer. The second form of operating system protection is authentication.

Detailed explanation-3: -Role Based Access Control (RBAC) RBAC grants access based on a user’s role and implements key security principles, such as “least privilege” and “separation of privilege.” Thus, someone attempting to access information can only access data that’s deemed necessary for their role.

There is 1 question to complete.