The following is an access verification technique, listing several

The following is an access verification technique, listing several files and the access allowed for a single use.

Identify the control technique used here and for each, explain the type of access allowed.

a. File_1        R-E-
b. File_12     RWE
c. File_13     RW–
d. File_14      –E-

 

2.

.     The following is an access verification technique, listing several users and the access allowed for File_13. Identify the control technique used here and for each and explain the type of access allowed. 
Finally, describe who is included in the WORLD category.

a.   User_10                 –E-

b.  User_14                 RWED

c.   User_17                 RWE-

d.  WORLD               R—

 

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer