Discretionary Access Control (Dac) Essay

666 words - 3 pages

Discretionary Access Control (DAC)
Computer security is important in every organization. It covers several areas such as locking the computer room and the computer itself, protecting login accounts with passwords, encrypting network communication lines and use of file protection among others. Whitman (2011) points out that computer system security ensures that your computer does what it is supposed to, even if the users do what they should not do. Discretionary Access Control (DAC) is a type of access controls that provides protection to the files in a computer system. This type of control restricts access to files based on the identity of users or groups which they belong. It is discretionary and lets you tell the computer system who can have access to your files and therefore you can specify the type of access allowed. For example, you can allow anyone to read a particular file in the system, but allow only you to be able to change it.
According ...view middle of the document...

An ACL allows for high security to be maintained and can be used with a DAC system.
An ACL provides better security file security by allowing you to define the file permissions for the owner of the file, the file group, specify other users and groups and give default permissions for each category. The organization can use an ACL with a DAC system to restrict access to data and files by determining the list of people who can view certain types of files. This form of access control still maintains high security in the organization regarding access of files. An ACL is a good compensation for high security systems, which only support DAC because they can solve the dilemma of allowing one person in a group to be able to modify the contents of the file. For example, if a particular group in the access list has permission to access a certain file, an ACL allows the whole group to access but limits the whole group to modifying it. Only one person in the list is able to modify the file the others can only access it.
Haldar (2010) explains that an ACL holds a detailed list of Access Control Entries which are used to make access decisions. This allows an organization to determine a list of users who have access to specific data and the privileges that they have with respect to that data or file. An access control triple consists of the user, the file and program with the corresponding access privileges noted for each. In a high security system, this type of access control prevents some users from accessing or modifying some files and programs even if they are using the same system and critical information is protected. An ACL, therefore, typically limits certain users from accessing certain types of information in the system. Another advantage of an ACL in maintaining high security in an organization is that it restricts access to both files in the system and in the domain. This is because there are file system ACLs and Networking ACLs. Networking ACLSs restricts access to a certain port numbers or IP addresses, and therefore, only certain users are able to access restricted network services.

Works Cited

Haldar, S. 2010. Operating Systems. India: Pearson Education
Whitman, M. 2011. Principles of Information Security. California: Cengage Learning

Find Another Essay On Discretionary Access Control (DAC)

Role Based Access Control (RBAC) Essay

628 words - 3 pages Role Based Access Control (RBAC) Role based access control is an ideology through which access to systems is restricted based on authority given. It is used by organizations with a relatively large number of employees ranging from five hundred to one thousand and above (Sieunarine & University of Oxford, 2011). This is implemented through the mandatory access control or through the discretionary access control. These are the only two ways

Security Requirements of the Organization Essay

1155 words - 5 pages free access on the network, institute a restructuring of the three main approaches to access control such as MAC, DAC, and RBAC. This would limit staff access to data they do not have privy to such as payroll and confidential information. The use of event logs will show how much time is spent and what they are doing and where. There are programs to check the system from the inside as well as checking the network for vulnerabilities like

An Introduction to Access Control Mechanisms

2739 words - 11 pages “more than one method of learning is accessed” [Li, 2009] in hands-on learning and “the information has a better chance of being stored in the memory for useful retrieval” [Li, 2009]; the students also remember the material better since they acquire a sense of accomplishment when they complete particular task which is assigned to them. Different lab modules like access control are explained briefly stating the types of access control (DAC, MAC


781 words - 4 pages University through the common entrance examination. I believed that a quality post-graduation study in Computer Science will be hugely helpful to gain considerable knowledge in the application development domain. Hence I have joined C-DAC, a premier research institute of India for my Post-Graduate Diploma in Advanced Computing. I am proud here to say that I was one among the 1000 students selected across India where millions of Engineering

Education of Women in Nepal

3630 words - 15 pages by society are not equal for men and women. Such inequalities or disparities in the roles to be performed by men and women are known as Gender discrimination. Many scholars or organizations have defined gender discrimination in different perspectives. Organization for Economic Cooperation and Development - Development Assistance Committee (OECD-DAC), has defined the discrimination in gender as: "Gender equality requires equal enjoyment by women

Visual Impairment and Blindness

1583 words - 7 pages provide both large buffer size and high processing power. Many 32-bit timers, single or dual 10-bit 8-channel ADC(s), 10-bit DAC, PWM channels and 47 GPIO lines with up to nine edge or level sensitive external interrupt pins.all the above mentioned features give these microcontrollers edge over other controllers and make them suitable for industrial control and medical systems. GPS GPS is abbreviation of global positioning system.it uses signal

Client/Server Process, And Client/Server Security

752 words - 4 pages encryption all the time, such as when we enter our credit card information into a secure website to purchase something, or when we do an electronic signature on document of some sort.Access control lists (ACL) are list that define who or what can access (read, write, or execute) objects. If the access control list can be modified by a user, or the owner of the file, then it is considered to be discretionary access control. If the ACL must be set

The relationship between corporate governance and earnings quality of Hong Kong listed company

1779 words - 7 pages what the company's management and the board duties and responsibilities.Corporate governance, being a crucial issue all over the world, is a no exceptional case for Hong Kong industries as well. Because of corporate governance have an important part for fiduciary responsibilities, responsibility, control mechanisms, auditing and disclose the information to shareholders and others. All related person should abide by the principles of corporate

"Thinking Critically" and Decision Making Simulation

1179 words - 5 pages awaiting that outcome, you are offering a discretionary bonus to employees. In regards to the pending legal action for the store's disability access, you have decided to challenge the legal notice based on the fact that you comply with federal standards. Last of all, to resolve the WAN issues, you have decided to escalate the problem to CIS.The last part of the decision making process is evaluating the decisions, first by implementing them and then

Thinking Critically Simulation

1178 words - 5 pages headquarters, but while awaiting that outcome, you are offering a discretionary bonus to employees. In regards to the pending legal action for the store's disability access, you have decided to challenge the legal notice based on the fact that you comply with federal standards. Last of all, to resolve the WAN issues, you have decided to escalate the problem to CIS.The last part of the decision making process is evaluating the decisions, first by

dont know

6840 words - 27 pages running their businesses. They argued that audits, due to their historically focused nature, were becoming less and less useful, particularly in an age of real-time competition. Meanwhile, companies' expectations continued to increase as clients demanded round- the-clock access as well as the attention of accounting firms' most senior and experienced professionals. Compounding this gap in perception and expectations was the effort of accounting

Similar Essays

Biometrics And Access Control Essay

1356 words - 6 pages admission to resources. It grants authenticated users clearance to specific resources based on the restrictions of the access control model. Access control primarily consist of the authentication of whom ever is trying to gain access to the resources, which confirms the identity of the user trying to log in. There are 4 models of access control: Mandatory Access Control, Role Based Access Control, Discretionary Access Control, and Rule Based

The Dynamism Of Access Control Essay

2999 words - 12 pages liability. The first input of this paper is to provide a detailed role played by the three most primary models of access control, discretionary access control (DAC), mandatory access control (MAC) and, role-based access control (RBAC). This information will allow us to see the technicality behind access control mechanism. The second input of this paper is to provide the theoretical framework of access control in information system security

Week 9 Final Essay

1396 words - 6 pages manner embrace retina scans, fingerprint and face recognitions, speech prints and autograph dynamics. The most generally used of these systems is the fingerprint scanning as it is more efficient as well as affordable. 5.2.1 According to the principle of discretionary access control, the information owner is the one who has discretion to dictate access to the system. Most corporate systems operate based on this principle. Other employees who are

Refining Tcp´S Rtt Dependent Mechanisms With An Advent Of Link Retransmission Delay Measurement In Wireless Lan

3133 words - 13 pages Network utilization by legacy Transmission Control Protocol (TCP) is determined by its Round Trip Time (RTT) dependent mechanisms for flow control and loss recovery. The RTT estimation does not always reflect actual network conditions especially in case of Wireless Local Area Network (WLAN). It can in turn influence the mechanisms falsely. This article proposes a Cross-Layer mechanism between Medium Access Control (MAC) and TCP for correcting