Question

A small financial firm is currently using ACL (Access Control List), a discretionary access control mechanism, for the protec
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution 4. a)

Role bases access control is a mechanism which restricts the user to access the system as per role within an enterprise.

Suppose for a data warehousing system not all users can create the warehouses or large scale databases . Some have the access of only fetching the records or data while some have the access to manipulate the data and update the data as per requirement.

So basically role based access control provide the employees to use only those information which is related to them not the all infrastructure or information.

Hence the all employees can't access the sensitive data which belongs to the upper management or to the customer but in future if any employee starts working on that information then manager can grant access to that information which ultimately reduce the risk .

The role based access depends on various key terms such as responsibility , authorization , employees level etc.

Organisation can defined that which user is a specialist , admin or an end user by assigning the role accordingly.

So , the role based access can limit the specific tasks such as view , update , retrieve information or files .

Nowadays limiting the network access becomes important for the organisation which have huge number of employees.Even some of them are on third party , some are clients or vendors. In such scenario providing access becomes a difficult thing. So the company now depends on the Role based access so the smoothness in the work as well as data sensitive will be remain safe.

Add a comment
Know the answer?
Add Answer to:
A small financial firm is currently using ACL (Access Control List), a discretionary access control mechanism, for the protection of its resources (including computer systems and data files). As...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter T...

    I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT