Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Respond to this peer post: GoodMorning class and instructor, the method of control access chose was role based access control or in shorter terms RBAC.

Respond to this peer post: GoodMorning class and instructor, the method of control access chose was role based access control or in shorter terms RBAC. The role based access control is a security approach that assigns system access permission based on users roles within an organization. Which simply means a company assigns certain individuals to have access to certain things.
Theses roles are assigned based on a person's qualifications, job, and responsibilities. This work for all the personnel in the organization from small workers to the head person in charge.
With role based access control it's here to prevent a list of potential threats and issues. The Role base access control helps prevent unauthorized access and the possibility of a security breach within the organization system. Like I stated earlier the RBAC gives out specific roles and predefined permissions which is why it's able to prevent someone from having access to something they aren't suppose to.
With the RBAC it ensure that each job has its own access to their specific job nothing more and nothing less. The role base access control works ok enchancing data integrity, confidentiality, and security by creating a tight connection between accessing data and not having all workers get the same access to information.
One procedure that can be used to support role based access control is user onboarding. This procedure can help old or new users know and everyone be issued their role to ensure they have their necessary access. Having an access checkup can be a great procedure. Assigning someone to go throughout the organization on a regular and check everyone access cards and update or change if need be. Having someone keep you on your toes isn't a bad thing and to make sure that a person don't have access to information that their not suppose toHaving training can also be placed to make sure everyone understands the importance of their roles and why they are assigned what they got to stop any unauthorized activity.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Moving Objects Databases

Authors: Ralf Hartmut Güting, Markus Schneider

1st Edition

0120887991, 978-0120887996

More Books

Students also viewed these Databases questions