Solution 4. a)
Role bases access control is a mechanism which restricts the user to access the system as per role within an enterprise.
Suppose for a data warehousing system not all users can create the warehouses or large scale databases . Some have the access of only fetching the records or data while some have the access to manipulate the data and update the data as per requirement.
So basically role based access control provide the employees to use only those information which is related to them not the all infrastructure or information.
Hence the all employees can't access the sensitive data which belongs to the upper management or to the customer but in future if any employee starts working on that information then manager can grant access to that information which ultimately reduce the risk .
The role based access depends on various key terms such as responsibility , authorization , employees level etc.
Organisation can defined that which user is a specialist , admin or an end user by assigning the role accordingly.
So , the role based access can limit the specific tasks such as view , update , retrieve information or files .
Nowadays limiting the network access becomes important for the organisation which have huge number of employees.Even some of them are on third party , some are clients or vendors. In such scenario providing access becomes a difficult thing. So the company now depends on the Role based access so the smoothness in the work as well as data sensitive will be remain safe.
A small financial firm is currently using ACL (Access Control List), a discretionary access control mechanism, for the protection of its resources (including computer systems and data files). As...
I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...