Question: solve quikly plaese Authorization controls are implemented by creating an en control matrix, which specifies who part of the IT System of what they are


Authorization controls are implemented by creating an en control matrix, which specifies who part of the IT System of what they are permitted to perform. When an employee tries to access a particular resource, the IT system performs a compatibility to that matches muthentication credentials against the matrix to determine if the action should be allowed. The following is an escort for de Bahrain Company User Access Files Programs User ID user Faculties statt students Assets Registration Scholarship Kirsting Mining Password Data Data Data Data 1111111 ABC 11 1 1 222222 DEF 0 1 1 lo 1 1 3333333KHI 11 1 11 1 1 11 a ta 0 1444444TKI O 3 NO 555555SIMNO 0 10 2 1 1 1 1 . 6666660 POR 1 11 4 17777777|STU 0 2 8888888Vwx 0 4 4 13 0 3 0 1 10 9999999/YZZ 1 Codes type of access: Codes of type of access: 0 No access permitted. 1 - Read and display only 2Read, display, and update. 3 - Read, display, update, and add. 4-Read, display, update, add, and delete. Based on the information above, answer the following questions: 1. Which users IDs can read and display all data files? Users IDs: 2. Which users IDs can read, display, update, add, and delete the grading? Users IDs: & 3. As for files, the user ID 8888888 what he/she can do? 4. Which users IDs can update and add to the hiring program? Users IDs: .& Which user ID can read, display, update, and add for all program except grading? Users IDs: 5. Which user ID can read, display, update, and add for all program except grading? User ID: 6. Which files or programs CANNOT be deleted by ANY user? 10pt v Av 2 I. X O t For the toolbar, press ALT+F10 (PC or ALT+FN+F10 (Mac). BIS Paragraph Arial V EEE X X, TT 31 BE 13 (1) +] 1912 @ . EE P.FR Moving to another question will save this response
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
