O'Reilly logo

CompTIA® Security+™: Study Guide, Fifth Edition by Emmett Dulaney

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Access Control

The three primary methods of access control are as follows:

Mandatory Access Control (MAC) All access is predefined.

Discretionary Access Control (DAC) Incorporates some flexibility.

Role-Based Access Control (RBAC) Allows the user’s role to dictate access capabilities.

A fourth method, Rule-Based Access Control (which also uses the RBAC acronym) is gaining in popularity. Each of these methods has advantages and disadvantages to the organization from a security perspective.

The method you choose will be greatly affected by your organization’s beliefs about how information needs to be shared. In a high-security environment, the tendency would be to implement either a MAC or RBAC method. In a traditional business ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required