Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please help Question Completion Ma 100 Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a

please help
image text in transcribed
image text in transcribed
image text in transcribed
Question Completion Ma 100 Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a user can access and what actions they are permitted to perform. When an employee tries to access a particular resource, the It System performs a compatibility test that matches the user's authentication credentials against the matrix to determine if the action should be allowed. The following is an access control matrix for files and programs at Bahrain Company. (6 Points) User Access Files Programs User ID User Faculties Staff Students Assets Registration Scholarship Grading Hiring Data Data Data 1111111 ABC 0 1 14 14 |1 10 b 2222222 DEF o |1 11 10 3333333 KHI 1 11 13 4444444 UKL 13 10 5555555 MNO |1 11 |1 6666666 PQR 7777777 STU 2 10 Activate Windows 8888888 VWX 14 14 13 2 10 10 11 9999999 YZZ Codes of type of access: (Read Very Carefuly) Password Data 14 3 0 144 10 14 11 11 0 H 13 14 10 10 1 1 10 1 14 14 2 11 3 10 [1 12 10 4 D 10 H 1. 44 B 1 13 0 11 10 10 113 18888888 WX 9999999 YZZ 2 1 1 10 3 3 13 Codes of type of access: (Read Very Carefuly) 4= No access permitted. 3= Read and display only. 2Read, display, and update. 1 = Read, display, update, and add. 0=Read, display, update, add, and delete. Based on the information above, answer the following questions: Based on the information above, answer the following questions: 1. Which users ID/IDS can read and display all data files? User/s: .&. &.. ........ 2. Which user/s ID/IDs can read, display, update, add, and delete the grading program? User/s: &. .&. 3. As for files, the user ID 8888888 can do.. ..? 4. Which user ID can update, add and delete to the Scholarship program? User: ********** 5. Which file/s or program/s can be deleted by user ID 6666666? User: & 6. Which file/s can be deleted by user 5555555

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Accounting questions