From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Comparing access control models

Comparing access control models

From the course: Cisco Certified CyberOps Associate (200-201) Cert Prep: 1 Security Concepts

Start my 1-month free trial

Comparing access control models

- [Narrator] When trying to gain access to resources, access control will first check to see if the subject has the appropriate permissions to interact with the object, to complete actions such as or view a file, write modify or delete file contents or execute, which enables the subject to run an application. To ensure compliance with the access controls and policies, we use auditing, which records or logs events such as a user attempting to create access or delete files or folders. There are several types of access control models that differ in the way the permissions are assigned. Let's talk about each of these. Discretionary access control is the most flexible as it allows the object owner to decide who can access the object. Think about it this way. At their discretion, they can grant permissions to allow users or groups to access the object. For example, the owner can share the object such as a folder and then…

Contents