Question: please help Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a user can access and

please help
please help Authorization controls are implemented by creating an access control matrix,
which specifies what part of the IT System a user can access
and what actions they are permitted to perform. When an employee tries

Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a user can access and what actions they are permitted to perform. When an employee tries to access a particular resource, the It System performs a compatibility test that matches the user's authentication credentials against the matrix to determine if the action should be allowed. The following is an access control matrix for files and programs at Bahrain Company. (6 Points) User Access Files Programs User ID User Faculties Staff Students Assets Registration Scholarship Grading Hiring Data Data Data 1111111 ABC 1 4 0 |1 4 10 100 2222222 DEF 1 1 |1 14 3333333 GH 13 10 4444444 UKL 5555555 MNO 6666666 PQR 12 7777777 STU Activate Windows 10 SEN 388888 VWX Password Data 10 0 144 3 10 4 10 14 11. 1 10 114 1 2 14 1 3 14 1 10 4 10 1 11 30 1 4 4 10 1 1 3 2 |1 3 10 3 3 2 10 14 11 14 10 3 10 [1 10 || 0 10 13 5555555 MNO 14 6666666 PQR 1 7777777 STU 8888888 VWX 4 4 9999999 YZZ 2 1 1 0 3 Codes of type of access: (Read Very Carefuly) 4- No access permitted. 3- Read and display only. 2-Read, display, and update. 1 = Read, display, update, and add. 0=Read, display, update, add, and delete. 0 4 0 4 1 10 14 4 14 2 1 13 10 10 3 4 10 3 10 1 0 10 3 Based on the information above, answer the following questions: 1. Which users ID/IDS can read and display all data files? User/s: ..... &. 2. Which user/s ID/IDs can read, display, update, add, and delete the grading program? User/s: &. &.. 3. As for files, the user ID 8888888 can do.. ..? 4. Which user ID can update, add and delete to the Scholarship program? User:. 5. Which file/s or program/s can be deleted by user ID 6666666? User: 6. Which file/s can be deleted by user 5555555

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!