Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Choose any topic from the \"Key Terms\" list and state the key term or concept y

ID: 3586220 • Letter: C

Question

Choose any topic from the "Key Terms" list and state the key term or concept you selected and provide an explanation on how it fits into the overall Access Control concept.

Key Terms and Concepts

Public-key Infrastructure (PKI) Pretty Good Privacy (PGP) Privacy Enhanced Mail (PEM)   Registration authority (RA) Digital Signature Standard (DSS) Digital signatures Distinguished name (DN) Encapsulating security payload (ESP) protocol Encipher Encryption Hash algorithms Hash functions Internet Protocol Security Nonrepudiation Advanced Encryption Standard (AES) Asymmetric encryption (public-key encryption) Certificate authority (CA) Cipher or cryptosystem Ciphertext or cryptogram Cryptography Data Encryption Standard (DES) Decipher Decryption Key or cryptovariable Access control Accountability (auditability) Address restrictions Authentication Authorization Discretionary access controls (DACs) Firewall Identification Kerberos Mandatory access controls (MACs) Nondiscretionary controls Packet-filtering firewall (filtering firewall) Passphrase Password Remote Authentication Dial-In User Service (RADIUS) Reverse firewalls Screened subnet Secure VPNs Smart card Stateful inspection firewalls (stateful firewalls) Strong authentication Synchronous tokens Terminal Access Controller Access Control System (TACACS) Trusted network Virtual private network (VPN) Untrusted network

Explanation / Answer

I have chosen Discretionary access control as my topic from the given Key terms and I will give an explanation about Discretionary access control and also how it fits in to the overall Access Control concept step by step below:

1. The Discretionary access control is nothing but it is a type of the access control which is defined by the Trusted Computer System Evaluation Criteria.

2. The Discretionary access control is used for restricting access to the objects based on the identity of subjects and also groups to which they belong.

3. The Discretionary Access Control (DAC) is a nothing but it is a type of access control in which a user has complete control over all the programs it owns and executes.

4. The Discretionary Access Control (DAC) also determines that the permissions other users have those those files and programs. Because DAC requires permissions to be assigned to those who need access

5. The Discretionary Access Control (DAC) is commonly called described as a need-to-know access model.

6. Generally the access control is nothing but the identification, authorization and authentication of the users for an systems.

7. so from the above point it is very clear that The Discretionary Access Control (DAC) fits into the overall Access Control concept.

Hope This Helps, if you have any doubts Please comment i will get back to you, thank you and please thumbs up