Multilayer User Access Control
Multilayer User Access Control
Student Name
Course Name
Instructor Name
The above methods help protect the organization, systems, and data for an organization
that wants to enforce multi-stage access control. Restricted profiles based on users' roles allow
users to edit, remove, or have access to confidential documents only for superiors and eyes-ups.
Limiting access by systems will automatically implement policies, prevent the downloading of
malicious material and allow only access to confident sources[ CITATION Kha19 \l 1033 ].
For application access, there are three types of implementing methods. Dbcreators can
only build databases but change their databases and restore them. Severadmins can adjust
configuration options across servers and shut down servers. Sysadmins will execute any server
task. The three strategies must not be taken lightly and can only be used by trustworthy
individuals in the business and others who can control them[ CITATION gen18 \l 1033 ].
Limiting reading and writing files and folders prevents data from being breached, but
only systems and users having to do so should be restricted. Finally, the limitation of information
access to individual users protects against and unintentionally deletes human errors. Each of
References
genians. (2018, July 24). Multi-layered access control. Retrieved from genians:
https://www.genians.com/learn-more/insights/multi-layered-access-control/
Khan, M., & Naz, D. T. (2019). A multi-layered security model for learning management
207-2011. doi:10.14569/IJACSA.2019.0101229