Information Security (Protection Model - Access Control)
Information Security (Protection Model - Access Control)
Protection Model
Access Control Model
Protection Models
• In information security, protection models refer to the various
methods and techniques used to protect systems and data from
unauthorized access, use, disclosure, disruption, modification, or
destruction.
• The goal of the Access Control Model is to ensure that only authorized
individuals or processes are allowed to access specific resources or
perform certain actions within a system.
Protection Models cont… Access Control Model
• There are several types of Access Control Models, including:
• Access decisions are based on the labels and predefined access rules,
which are typically enforced by the operating system or security
software.
Protection Models cont…
Access Control Model: Mandatory Access Control (MAC)
Protection Models cont…
Access Control Model: Discretionary Access Control (DAC)
• In this model, access control decisions are left to the discretion of the
resource owner.