Access Control in Network Administration: Types and Examples

Access Control Lists (ACLs) for Object Owners in Network Administration

Question

The network you administer allows owners of objects to manage the access to those objects via access control lists.

This is an example of what type of access control?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

The network access control mechanism described in the question, where owners of objects manage access to those objects via access control lists, is an example of Discretionary Access Control (DAC).

DAC is a type of access control where owners or administrators of objects have complete control over the access to those objects. In this mechanism, owners can grant or deny access to others as they see fit.

In the case described in the question, access control lists are used to implement DAC. These lists specify the access permissions for each user or group of users for a given object.

In contrast, Role-Based Access Control (RBAC) is a type of access control that is based on a user's role within an organization. Each role is associated with a set of permissions that are defined by the administrator. When a user is assigned a role, they are automatically granted the permissions associated with that role.

Mandatory Access Control (MAC) is a type of access control where access to objects is determined by the security level or clearance of the user and the sensitivity or classification level of the object.

Confidentiality, Integrity, and Availability (CIA) is a triad that represents the three primary goals of information security. Confidentiality refers to the protection of sensitive information from unauthorized disclosure, Integrity refers to the protection of data from unauthorized modification, and Availability refers to the protection of data from unauthorized denial of access.

In summary, the access control mechanism described in the question is an example of Discretionary Access Control (DAC).