Describe how rule-based access controls can be implemented in the DAC model.

What will be an ideal response?

With DAC model rule-based access controls, access to information is granted based on a set of rules specified by a central authority. This is a DAC model because the individual user is the one who decides which rules apply. Role-based models can also be implemented under DAC if an individual system owner wants to create the rules for other users of that system or its data.

Computer Science & Information Technology

You might also like to view...

What are Specter Pro, FakeGINA, and Eblaster examples of?

a. Wrapper tools b. Keyloggers c. Backdoors d. Port redirection tools

Computer Science & Information Technology

If you copy a folder to a location on the same drive, or to different drive, which of the following describes the effect this action has on the permissions

a. The folder retains its original permissions. b. The folder permissions must be re-created by the administrator. c. The person who copied the file now has full control if he did not have it before. d. The folder inherits the permissions of the target parent folder it was copied into.

Computer Science & Information Technology