Multilayer User Access Control and Implementation

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Multilayer User Access Control and Implementation

For the construction of secure virtual architectures, the creation of multilayer access control plays an enormous role. The main task of such control is to protect against unauthorized intrusion of fraudsters into the defended object. In particular, one of the models for creating a cybersecurity system can be the principle of mandatory access control (MAC). It is necessary to admit that such a multilayer access control format is mainly intended for the prevention of potential leakage of confidential information from a protected virtual system (What is mandatory access control, 2019). Therefore, the basic idea of MAC is that, to each level object of system, the particular digital label that allows describing the index of confidentiality of the information actual for the given information is prescribed. These confidentiality rules are constant: at each interaction with the data, together with a material, the label is also transferred. In classified industries, such as the military or aviation industry, the gradation of such indicators begins with the level of unclassified and ends with top secret data. In particular, if a user with inappropriate access tries to get classified information, the program will refuse to give their files, and consequently, it is essential that the external labels (which the user has) coincide with the internal ones (which are built into the database) (Mandatory access control, 2020). At the same time, a manager with a high level of access can quickly obtain materials from the unclassified category. The absolute benefit of this model for the implementation of multilayer access control is the delimitation of access to objects controlled by the system itself. On the other hand, mandatory access control is not complicated in technical execution: the developers need to create rules and assign privacy tags to materials and users.

References

Mandatory access control vs discretionary access control: Which to choose?? (2020). EKRAN. Web.

What is mandatory access control (MAC)? (2019). KISI. Web.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now