In a secure web application, users are granted access to features based on their job role. This is an implementation of ____________.
- Attribute-Based Access Control (ABAC)
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
The described implementation reflects Role-Based Access Control (RBAC), where access permissions are based on users' job roles. RBAC enhances security by ensuring individuals only have access to resources necessary for their roles, minimizing the risk of unauthorized activities. Understanding RBAC is essential for designing access control strategies that align with organizational structures and security policies.__________________________________________________
Loading...
Related Quiz
- Which law requires U.S. federal agencies to develop, document, and implement an information security and protection program?
- In an out-of-band SQL injection attack, data is retrieved using:
- Secure coding practices recommend using ____________ to manage and store secrets like API keys and passwords.
- The security measure that ensures only approved applications run on a system is called _______.
- What does REST stand for in the context of API design?