![]() ![]() Once malware is detected, the AV program will attempt to remove the offending item from the system or may simply quarantine the file for further analysis by an administrator. (Also known as authorization.)Īnti-virus (anti-malware) - A security program designed to monitor a system for malicious software. RBAC (Role Base Access Control) controls access through the use of job labels, which have been assigned the permissions and privilege needed to accomplish the related job tasks. ![]() MAC (Mandatory Access Control) restricts access by assigning each subject and object a classification or clearance level label resource use is then controlled by limiting access to those subjects with equal or superior labels to that of the object. DAC (Discretionary Access Control) manages access through the use of on-object ACLs (Access Control Lists), which indicate which users have been granted (or denied) specific privileges or permissions on that object. There are three primary forms of access control: DAC, MAC, and RBAC. ![]() Access control - The means and mechanisms of managing access to and use of resources by users. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |