Access Control

Dover Castle amid hills of green
Dover Castle


Dover castle, built by King Henry II, was a way to control physical access. 

Author: Jake Keup. Source: Wikimedia Commons. License: CC BY 2.0.

Access control is the process by which permissions are granted for given resources. Access control can be physical (e.g., locked doors accessed using various control methods) or logical (e.g., electronic keys or credentials). There are several access control models, to include:

  • Role-based access control: Access is granted based on individual roles.
  • Mandatory access control: Access is granted by comparing data sensitivity levels with user sensitivity access permissions.
  • Attribute-based access control: Access is granted based on assigned attributes.
  • Discretionary access control: Access is granted based on the identity and/or group membership of the user.

The access control model used is determined based on the needs of the organization. To determine the best model, a risk assessment should be performed to determine what threats might be applicable. This information is then used to assess which model can best protect against the threats.

Check Your Knowledge

Choose the best answer to each question:
Question 1
When a user can dynamically (or selectively) assign privileges for other users of the system, this is called which of the following access control models?
SoD
MAC
RBAC
DAC
Question 2
When a retail company places access control policies in place for its cashiers, it has implemented which of the following types of policies?
role-based policy
identity-based policy
mandatory access policy
separation of duties policy
Question 3
A sensitivity level attached to an object must contain which of the following in mandatory access control?
the item's classification
the item's classification and category set
the item's category
the item's need to know
Question 4
When controlling access to an object by a subject, security professionals must set up access rules. The following are the three access control models that can be used to set up these rules.
mandatory, discretionary, nondiscretionary
role-based, identity-based, attribute-based
MAC, DAC, RBAC
none of the above
Question 5
Rule-based access control (RuBAC) access is determined by rules that are in which of the following categories?
discretionary access control (DAC)
role-based access control (RBAC)
nondiscretionary access control (NDAC)
identity-based access control
Question 6
Which of the following is the category with rules that are not established by user preferences and can only be changed administratively?
nondiscretionary access control
discretionary access control
mandatory access control
system-based access control
Question 7
Which of the following is true of the mandatory access control environment?
The system or security administrator will define the permissions for subjects.
The administrator does not dictate the user's access.
The administrator configures the proper level of access as dictated by the data.
all of the above
Question 8
Which of the following is defined as the dominance relationship of the MAC system?
The security clearance of the subject is reviewed and compared with the object sensitivity level or classification level.
The security clearance of the subject is not important because the system provides authorization.
The security clearance of the subject is compared with the separation of duties policy, and access is provided.
The security clearance of the subject has to be at the highest level of top secret.
Question 9
Which of the following is not an access control technique?
remote access controls
discretionary access control
mandatory access control
role-based access control
Question 10
In some access control models, the data owner or resource owner can specify access to resources based on identity. Which of the following access control models does this describe?
discretionary access control
mandatory access control
identity-based access control
rule-based access control
Question 11
As the name implies, which of the following access control models is an example of DAC based on the characteristic of the user?
role-based access control
rule-based access control
identity-based access control
mandatory access control

Licenses and Attributions

Chapter Twelve: Western Europe and Byzantium circa 1000-1500 CE  from World History: Cultures, States, and Societies to 1500 by Berger et al. is available under a Creative Commons Attribution-ShareAlike 4.0 International license. UMGC has modified this work and it is available under the original license.