Question:
explanation of access control methods?
Andrew
2010-01-25 05:34:59 UTC
im looking for a description of what access control methods are
Six answers:
Mark J
2010-01-25 05:48:27 UTC
acces control methods, security policies are essentailly rules which dictate how certain services, software or hardware are made avaialble of denied to users.



usually the system administrator will allocate users to user groups, and allocate resources and services to user groups. a well structured security policy should allow authorised users access to whatever they need, and deny access to unauthorised users



some resources are allocated to specific users (for instance most *nix system allocate a certain amount of personal user space



on a *nix system you may have a webserver, in order to secure the system the userid the webserver uses should have minimum access rights to do things



in a dataabse server

you would have differnet levels and types of user

you might have system administrtators such as DBA's whcih can do things with tables, but can't view data

you could have developers who can look at the development server but are not allowed access to the live server



a specific userid or more likely usergroup might have access to specific tables or view and may have read only permission, may have read/write permissions or may have full data access and NO design access.





whatever else you do do, you should rarely run software when in adminstrator mode... that is one of the biggest vulnerabilities in Microsoft systems in as much as most users use the default user id with admin permissions, when they shoudk reserve admistrator for occasional use, and use other accounts as required.
?
2015-08-10 22:15:30 UTC
This Site Might Help You.



RE:

explanation of access control methods?

im looking for a description of what access control methods are
sam
2010-01-25 08:15:36 UTC
hi ya

Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.

-------------------------------------------------

In order to protect assets in a company or corporation, security analysts and programmers can set access control to individual components on a computer. These components can be the operating system, programs or even hardware settings. It is a necessary function that many end users often see as a burden.



Access control can be used with the following items when implementing security:



* Objects - Files or hardware settings (restriction of network settings, usb ports or individual files and folders)

* Subject - a process function (such as opening a file or folder or program) a subject can be an end user

* Operation - is the process of an end user trying to modify or delete an object









cheers man
Prateek
2010-01-25 05:39:02 UTC
For Windows



http://msdn.microsoft.com/en-us/library/aa374876(VS.85).aspx
anonymous
2016-03-13 09:26:56 UTC
Hi Tom, finally someone in this section that is not just banging on about things that go bump in the night! I usually like to pay out a little on the kids in section that just hear a noise in the middle of the night after being on their "play station" for umpteen hours playing zombie shoot ‘em up games and claim there are ghosts in their room!! Because that is what many of the nitwits in section do. Their little brains are so hyped from all the media devises available to them that it is little wonder they jump at shadows and hear things in the middle of the night. But your experience is far different from that and does make me, a stanch non-believer, wonder what or how this is happening to you. Proof, as you put it, in this case is surely nigh on impossible. I know I am of not much help here, but I thought it worth comment as your experience seems to be a little different from many of the things claimed in this section and are far easier explained. As I said before, if a person is subjected to many hours of media, of course the power of suggestion will come into play. I find it humorous when someone says "I was in bed and saw..." No, that was a dream. Having said that though, could it simply be that you did see the key earlier and that you knew that your brother in law was pilfering items? Therefore in order to safeguard these items, you had a sudden thought that you should actually lock the door "right now" in case you forget to later? You see I have had a similar thing, in some ways, happen. Although the house in question (and part of a will dispute) is some 5 hours drive, we 'felt' that my brother in law was pilfering items, but we had no proof! My wife woke in the middle of the night and told me that she needed to "get the key". I said "what key?" She said "the key to the house". I then replied, "but we don't have one, we have looked everywhere." So, at 2AM (or something like that), my wife got out bed, went into the kitchen, opened one of the cupboards. Grabbed the key that was hanging on a nail on the inside support rail. I said how did you know where that was, and guess what her reply was. She said, "Mum just told me." as matter of factly. Then went to sleep. Her mum had died some 8 months prior. Next morning she did not remember a thing about it and did not believe when I told how we found the key. Now to this very day she still swears to me that she had absolutely no prior knowledge of where the key was. Now, can she prove that? NO! Is it possible that she was told? May be. Is it also possible that she even saw the key at some stage and it came back to her in a dream? Also possible. But it remains unexplainable... (oh and btw, the B-in-L did pilfer stuff until we drove the 5 hours to lock the door...)
anonymous
2014-08-25 23:57:43 UTC
www.okorder.com


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...