Monthly Archives: October 2022
-
Posted: October 18, 2022
The use of access control technologies can help to identify who has the privilege and responsibility for performing specific jobs. It authenticates them, then grants only that person keys or terminals they need - nothing more than what's necessary at any given time. There are three types of access control technologies that are commonly used in businesses and other organizations to manage access to facilities and resources. These technologies include Discretionary Access Control (DAC), Managed Access Control (MAC), and Role-Based Access Control (RBAC).
Here are the 3 types of Access Control:
1. Discretionary Access Control (DAC)
Discretionary Access Control, or DAC, is a type of access control system that gives a business owner the ability to grant access privileges to other users on a given system. This access can be controlled at both a per-user and per-object level, which makes DAC a very effective method for ensuring only authorized users have access to sensitive information. When planning access control installation, it is important to consider several key access control best practices that can help ensure effective implementation of DAC. These include developing access control policies that are aligned with corporate objectives and employing an access control matrix to track access authorizations throughout the organization.There are drawbacks to discretionary access control due to the fact that it gives the end-user total control over security level settings for other users and permissions given. These permissions are inherited into programs they use which could potentially lead