Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 6 points Save Answer Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

Question 1 6 points Save Answer Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a user can access and what actions they are permitted to perform. When an employee tries to access a particular resource, the IT System performs a compatibility test that matches the user's authentication credentials against the matrix to determine if the action should be allowed. The following is an access control matrix for files and programs at Bahrain Company. User Access Files Programs User ID User Faculties Staff Students Assets Registration Scholarship Grading Hiring Password Data Data Data Data 1111111 ABC 0 1 10 0 1 4 14 0 2222222 DEF lo 1 1 lo 1 1 0 10 3333333GHI 1 1 1 1 1 3 2 1 14444444 JKL 3 0 1 3 0 O 13 5555555MNO lo 4 4 10 2 1 14 10 6666666 PQR 1 1 1 1 1 1 1 1 77777/STU 10 2 0 3 14. lo 88888/VWX 4 14 14 4 0 10 0 10 19999999/YZZ 10 1 1 10 3. 3 0 3 Codes of type of access: Codes of type of access: 0 = No access permitted. 1 = Read and display only. 2 = Read, display, and update. 3 Read, display, update, and add. Read, display, update, add, and delete. Based on the information above, answer the following questions: 1. Which users IDs can read and display all data files? Users IDs & & 2. Which users IDs can read, display, update, add, and delete the grading? Users IDs. & & 3. As for files, the user ID 8888888 what he/she can do? 4. Which users IDs can update and add to the hiring program? Users IDs: & 5. Which user ID can read, display, update, and add for all program except grading? User ID: 6. Which files or programs CANNOT be deleted by ANY user? &

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beginning Apache Cassandra Development

Authors: Vivek Mishra

1st Edition

1484201426, 9781484201428

More Books

Students also viewed these Databases questions

Question

How many Tables Will Base HCMSs typically have? Why?

Answered: 1 week ago

Question

What is the process of normalization?

Answered: 1 week ago