Mile2 Cybersecurity Certifications

Reply To: OCU C)ISSO A Discussion Lesson 04

#111372
Trae Johnson
Participant

Access control models and technologies play a critical role in regulating how users interact with information and systems. The Discretionary Access Control model gives the data owner control to decide who has resources, usually through some form of access control list. Although this is often used with discretionary access control, it can be risky with high-security requirements. MAC assigns access based upon clearance levels and the sensitivity of information, hence stronger protection. Role-Based Access Control grants permissions depending on one’s role within the organization; setting up such roles simplifies administration while maintaining security. Rule-Based Access Control applies access rules across an organization, regulating the access of all users independent of user identity or position. Both the video and text depict that these models play an important role in consistently enforcing security policies, maintaining data confidentiality, and minimizing the risk of unauthorized access.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.