2,071 views
0 votes
0 votes

Which of the following is the process by which a user’s access to physical data in the application is limited, based on his privileges?

  1. Authorization
  2. Authentication
  3. Access Control
  4. All of these

2 Answers

5 votes
5 votes

The answer of this question is in the definition of each option :

Authentication is the process by which a user's identity is checked.
Authorization is the process by which the user's privileges are ascertained. 
Access control is the process by which the user's access to physical data in the application is limited, based on his privileges. 

Answer : Access control

1 votes
1 votes
I would say Access Control List is one of the way to implement Authorization .

I rem a bit of it

Access control in an OS is represented by matrix

We have a row defined for each user

and coloumn defined for physical data such as Files A , files B

Then if i have access to file A then a bit set it

and for file B if not

There is a thin line between Authorization an Access control

But what i think if they say Physical data ( it mean we are actually talking about files records and all ) Who has access to which is captured by Access Control

And Overall access is defined by authorization

But acCess control link is not usually used through  tmatrIx .it takes a lot of space . Because it captures both right for all the files in a system

So instead of this a new approach was implemented called "Capabilities "

where with user we will associated all the files it can access and in which mode

If a system has A---Z files

and if i am dealing with A and B in Write mode for both

Then i will just have this information stored for it . I wont have any related to C ---Z .  That why this method was more favourable over access Control ( Because in Access Control if user dont work with C---Z files also then also information about is stored by setting bit 0 )

 

 

// i have choosen  system security as my final year subject . You can read Information security by Mark Stamp . Seriosusly a good book
edited by

Related questions

213
views
0 answers
0 votes
Vijay_Ram asked Oct 8, 2022
213 views
Is Ipv6 & network security is in gate 2023?
1.1k
views
2 answers
0 votes
taurus05 asked Nov 27, 2021
1,094 views
I read the PDF but couldn't find anything mentioned about it. Kindly confirm.
245
views
0 answers
0 votes
srestha asked Dec 30, 2018
245 views
It is impossible to produce a document that differs from the original document with single bit change and valid signatureI am unable to understand, why is it impossible? ...
474
views
0 answers
0 votes
Ashishwastaken asked Dec 23, 2018
474 views