Question: Authorization controls are implemented by creating an access control matrix, which specifies what part of the 11 System can what actions they are permitted to

Authorization controls are implemented by creating an access control matrix, which specifies what part of the 11 System can what actions they are permitted to perform. When an employee tries to access a particular resource, the IT System performs a compiliny t that matches the user's authentication credentials against the matrix to determine if the action should be allowed. The following is an acc matrix for files and programs at Bahrain Company. User Access Files Programs User ID User Faculties Staff Students Assets Registration Scholarship Cirading Hiring Password Data Data Data Data 1111111 ABC 10 1 0 0 14 D 2222222 DEF 0 1 10 1 1 0 10 3333333 GH 1 1 1 1 3 12 1 4444444 JKL 3 10 3 1 3 10 10 3 5555555 MNO 14 4 10 12 14 10 6666666 PQR 1 1 1 I 1 1 Act Go 7777777 STU 10 12 0 2 3 12 4 8888888/VWX 4 14 4 4 0 10 10 10 99 YZZ 0 3 0 Codes of type of access: 0-No access permitted. 1 - Read and display only. 2-Read, display, and update. 3-Read, display, update, and add. 4-Read, display, update, add, and delete. Based on the information above, answer the following questions: 1. Which users IDS can read and display all data files? Users IDs: &. 2. Which users IDs can read, display, update, add, and delete the grading? Users IDs: &.. 3. As for files, the user ID 8888888 what he/she can do? 4. Which users IDs can update and add to the hiring program? Users IDs: &. 5. Which user ID can read, display, update, and add for all program except grading? User ID: ...... 6. Which files or programs CANNOT be deleted by ANY user? .&

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!