Mile2 Cybersecurity Institute

Reply To: OCU C)ISSO A Discussion Lesson 04

#111240
Isabelle Tubbs
Participant

Access control models are important tools for an organization to carry out certain goals from their security policy. These models must be clear ways to regulate the interactions between subjects and objects.

Discretionary access control models are very popular because the person who owns the data must determine who is allowed to access it, depending on the user’s identity. The person can use access control lists to do this, but it does not provide an extremely high level of security that some businesses may require. Mandatory access control grants users access depending on how important/sensitive the information they are trying to access is. A user must have clearance to gain access, making this system more secure.

Role-based access control means that the level of access a user receives depends on that user’s role in the organization. Administrators will assign certain people roles as a way to only grant specific people access. Rule-based access control is a model gives rules that will apply to everyone, regardless of role, identity, etc.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.