In which of the following access control models can a user not grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
The correct answer is C. Mandatory Access Control (MAC).
Mandatory Access Control (MAC) is a security model in which the access to resources is controlled based on a set of predefined rules, which are enforced by the system. It is a more restrictive access control model compared to the other models, and the user does not have the authority to grant or revoke permissions.
In MAC, each object is assigned a sensitivity level and each user is assigned a clearance level. A user can access an object only if their clearance level is higher or equal to the object's sensitivity level. The sensitivity level of an object determines the level of protection that it needs.
In MAC, the security policy is centrally managed and enforced by the operating system or security software. This means that even if a user has possession of an object marked as secret, they cannot grant access to other users unless they have the appropriate clearance level.
On the other hand, in Discretionary Access Control (DAC), users have the authority to grant or revoke access permissions to objects they own. In this model, the user has complete control over the objects they create, and they can assign access permissions to other users as they see fit.
Role-Based Access Control (RBAC) is a security model in which access to resources is based on the user's role in the organization. Access to resources is assigned based on job responsibilities, and users are assigned roles that determine their access privileges.
Access Control List (ACL) is a security model that uses a list of permissions attached to each object to control access to resources. The access permissions are specific to each user or group, and they are assigned by the object owner or administrator.
In conclusion, MAC is the access control model where a user cannot grant permissions to other users to see a copy of an object marked as secret that he has received, unless they have the appropriate permissions.