Saturday, May 4, 2019
Information Security Topic Essay Example | Topics and Well Written Essays - 750 words
Information Security Topic - Essay Examples serve to secure  contrary aspects of Information .In the following article one such method to secure network called Access  correspond List would be studied and an attempt would be made to understand what level of security is achieved  by its implementation.INTRODUCTION Access Control list (ACL) at a very basic level  repair to define and control the various permissions that  jakes be  link up to an object .The object can be a software program like yahoo messenger, a network service like FTP, a file, sound card, other programs, the network, a modem, and so on and so forth. Access means what kind of  exploits can be done on these objects. Examples include reading a file, writing to a file, creating or deleting objects, communicating with another program, etc. Access Control List defines who is allowed to use that software/service and what operation can he perform on that software/service for example ACL would define who are the users who can    use Yahoo messenger and whether they can use it to send files or albums through it or  plain chat on it. At a very basic level they mean An explicit  heap of permissions for users (or groups of users) detailing who can access specific items. 2CAPABILITY/ kind of security achieved  access control lists  bounds the access to information to the desired or permitted users . It also sets to establish privileges and permissions that a permitted user would have on the objects. An access control list can be visualized as a list containing permissions attached to an object . The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object. In a typical ACL, each  entre in the list specifies a  content and an operation for example, the entry (Bob, delete) on the ACL for file ABC gives Bob permission to delete file ABC.How ACL Work when a subject requests for an operation, the system first checks for the entry of the subject in the l   ist in order to determine   
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.