Question: Question 12 6 points Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a user


Question 12 6 points Authorization controls are implemented by creating an access control matrix, which specifies what part of the IT System a user can access and what actions they are permitted to perform. When an employee tries to access a particular resource, the It System performs a compatibility test that matches the user's authentication credentials against the matrix to determine if the action should be allowed. The following is an access control matrix for files and programs at Bahrain Company. (6 Points) User Access Files Programs User ID User Password Faculties Data Staff Students Data Data Assets Data Registration Scholarship Grading Hiring 1111111 ABC 0 1 0 0 1 4 14 0 2222222 DEF 0 1 0 1 1 0 0 3333333 GHI 1 1 |1 3 2 1 4444444 JKL 3 0 3 1 3 0 10 3 5555555 MNO 0 4 4 10 2 1 4 10 6666666 PQR 1 1 1 1
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
