2,036 views
0 votes
0 votes

Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges?

  1. Authorization
  2. Authentication
  3. Access Control
  4. All of these

2 Answers

5 votes
5 votes

The answer of this question is in the definition of each option :

Authentication is the process by which a user's identity is checked.
Authorization is the process by which the user's privileges are ascertained. 
Access control is the process by which the user's access to physical data in the application is limited, based on his privileges. 

Answer : Access control

1 votes
1 votes
I would say Access Control List is one of the way to implement Authorization .

I rem a bit of it

Access control in an OS is represented by matrix

We have a row defined for each user

and coloumn defined for physical data such as Files A , files B

Then if i have access to file A then a bit set it

and for file B if not

There is a thin line between Authorization an Access control

But what i think if they say Physical data ( it mean we are actually talking about files records and all ) Who has access to which is captured by Access Control

And Overall access is defined by authorization

But acCess control link is not usually used through  tmatrIx .it takes a lot of space . Because it captures both right for all the files in a system

So instead of this a new approach was implemented called "Capabilities "

where with user we will associated all the files it can access and in which mode

If a system has A---Z files

and if i am dealing with A and B in Write mode for both

Then i will just have this information stored for it . I wont have any related to C ---Z .  That why this method was more favourable over access Control ( Because in Access Control if user dont work with C---Z files also then also information about is stored by setting bit 0 )

 

 

// i have choosen  system security as my final year subject . You can read Information security by Mark Stamp . Seriosusly a good book
edited by

Related questions

0 votes
0 votes
0 answers
1
Vijay_Ram asked Oct 8, 2022
204 views
Is Ipv6 & network security is in gate 2023?
0 votes
0 votes
2 answers
2
taurus05 asked Nov 27, 2021
1,063 views
I read the PDF but couldn't find anything mentioned about it. Kindly confirm.
0 votes
0 votes
0 answers
3
srestha asked Dec 30, 2018
243 views
It is impossible to produce a document that differs from the original document with single bit change and valid signatureI am unable to understand, why is it impossible? ...
0 votes
0 votes
0 answers
4
Ashishwastaken asked Dec 23, 2018
465 views