Saturday, May 4, 2019
Information Security Topic Essay Example | Topics and Well Written Essays - 750 words
Information Security Topic - Essay Examples serve to secure contrary aspects of Information .In the following article one such method to secure network called Access correspond List would be studied and an attempt would be made to understand what level of security is achieved by its implementation.INTRODUCTION Access Control list (ACL) at a very basic level repair to define and control the various permissions that jakes be link up to an object .The object can be a software program like yahoo messenger, a network service like FTP, a file, sound card, other programs, the network, a modem, and so on and so forth. Access means what kind of exploits can be done on these objects. Examples include reading a file, writing to a file, creating or deleting objects, communicating with another program, etc. Access Control List defines who is allowed to use that software/service and what operation can he perform on that software/service for example ACL would define who are the users who can use Yahoo messenger and whether they can use it to send files or albums through it or plain chat on it. At a very basic level they mean An explicit heap of permissions for users (or groups of users) detailing who can access specific items. 2CAPABILITY/ kind of security achieved access control lists bounds the access to information to the desired or permitted users . It also sets to establish privileges and permissions that a permitted user would have on the objects. An access control list can be visualized as a list containing permissions attached to an object . The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL, each entre in the list specifies a content and an operation for example, the entry (Bob, delete) on the ACL for file ABC gives Bob permission to delete file ABC.How ACL Work when a subject requests for an operation, the system first checks for the entry of the subject in the l ist in order to determine
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.