Question

Problem 3: Access Control PokeyGram, a cutting-edge new email start-up, is setting up building access for its employees. Ther

0 0
Add a comment Improve this question Transcribed image text
Answer #1
  1. (c)Capabilities

Capability Based security is a concept in the system,one of the existing security model.A capability is a communicable ,token of authority.

it refers to the value that references an object along with an associated sets of access rights.

it works on the principle of designing user programs such that they directly share capabilities with each other according to the principle of least privilege and it uses approaches of hierarchial protection domains.

so this mechanism call be effectively used by PokyGram in order to minimize delay for the elevators.

2. RBAC restrict network access based on a persons role with an organization and an advanced access control method. it is highly effective in the above network such that it has several advantage so that in that network each employees has given there on roles and access control are given according to that.so according to RBAC, employees are only allowed to access the information necessary to effectively perform their jobs.

Add a comment
Know the answer?
Add Answer to:
Problem 3: Access Control PokeyGram, a cutting-edge new email start-up, is setting up building access for...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Problem 3: Access Control PokeyGram, a cutting-edge new email start-up, is setting up building access for its employees...

    Problem 3: Access Control PokeyGram, a cutting-edge new email start-up, is setting up building access for its employees. There are two types of employees: managers and engineers, and there are three departments: Security, Networking, and Human Resoures. Each employee works in a single department, and each department is housed on a different floor. Managers are allowed access to any floor, while engineers are allowed access only to their own floor. There are three badge-operated elevators, each going up to only...

  • Problem 3: Access Control PokeyGram, a cutting-edge new email start-up, is setting up building access for its employees...

    Problem 3: Access Control PokeyGram, a cutting-edge new email start-up, is setting up building access for its employees. There are two types of employees: managers and engineers, and there are three departments: Security, Networking, and Human Resoures. Each employee works in a single department, and each department is housed on a different floor. Managers are allowed access to any floor, while engineers are allowed access only to their own floor. There are three badge-operated elevators, each going up to only...

  • Requirement d. For each control, list a specific misstatement that could result from the absence of...

    Requirement d. For each control, list a specific misstatement that could result from the absence of the control. (Use each letter corresponding to a specific misstatement only once.) (Click the icon to view the misstatements likely to result from the absence of the controls.) i Misstatements due to absence of the control A fictitious payroll check could be processed for a fictitious employee if invalid employee numbers J. are included in the employee master file. A fictitious payroll check could...

  • database and sql problme THE QUESTIONS 3, 4,5 and 6 REFER TO THE RELATIONAL TABLES LISTED...

    database and sql problme THE QUESTIONS 3, 4,5 and 6 REFER TO THE RELATIONAL TABLES LISTED BELOW CREATE TABLE Department ( DECIMAL(5) VARCHAR(30) CHAR(5) DATE NOT NULL NOT NULL NOT NULL * Department number /*Department name * Department manager number */ /Manager start date DNumber DName Manager MSDate CONSTRAINT Department_PK PRIMARY KEY(DNumber) CONSTRAINT Department_CK UNIQUE(DName) CREATE TABLE DeptLocation DECIMAL(5) VARCHAR(50) NOT NULL NOT NULL DNumber * Department number */ * Department location */ Address CONSTRAINT DeptLocation_PK PRIMARY KEY(DNumber, Address) CONSTRAINT...

  • DISSONANCE BETWEEN EMPLOYEES Matt created his T-shirt business, T’d up, 30 years ago, building the company...

    DISSONANCE BETWEEN EMPLOYEES Matt created his T-shirt business, T’d up, 30 years ago, building the company up from a small, no-name brand that he ran out of his parents’ garage while he was in school into a well-known local company that supplies custom T-shirts and other clothing and accessories for a wide variety of customers, both local and national. T’d up’s big break came 20 years ago when a local band became famous and sourced all of their concert clothing...

  • STEP 1: In your own words define problem employees and the categories they may fall into....

    STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...

  • Case 3: Recruiting CASE THREE: RECRUITING Case Objectives Recruiting is the first stage in which ...

    Case 3: Recruiting CASE THREE: RECRUITING Case Objectives Recruiting is the first stage in which organizational plans for staffing come into contact with the labor market for employees. Before making any new recruiting effort, an organization needs to carefully consider the methods available and balance out the costs of each method with the organization’s needs. The recruiting case provides an opportunity to see how staffing managers develop plans for recruiting efforts. You will develop a recruiting strategy and a recruiting...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3...

    internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3 carefully. Then write concise answers to the following questions regarding the internal control system of Duarf, Inc. Clearly label your responses with proper headings and subheadings. Be very specific and precise. Answers that appear to be beating around the bush will not get any credit. 1. What are the controls in place that under normal conditions should function well to prevent embezzlements or frauds?...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT