Three Components of a Global Access Model
Discuss the three components of a global access model
Asked by Alice on June 25, 2025
1 Answers
A global access model, in the context of network security, typically involves three fundamental components that define and enforce access to resources across a system or network. These are:
- Subjects: These are the active entities that request access to resources. Subjects can be human users, groups of users, processes, or programs. They are the 'who' in an access control decision. For example, a user attempting to open a file is a subject.
- Objects: These are the passive entities or resources that subjects wish to access. Objects can be files, directories, databases, printers, web pages, or even specific functions within an application. They represent the 'what' is being accessed. An example of an object is a confidential document on a server.
- Access Operations (or Rights/Permissions): These define the specific actions that subjects are permitted or denied to perform on objects. Common operations include read, write, execute, delete, create, or modify. These specify 'how' a subject can interact with an object. For instance, a user might have read-only access to a report but full write access to their personal directory.
Yael - June 25, 2025
Your Answer
Related Questions
-
What is security and information security? What is the difference?
1 answers
-
What is security and information security? What is the difference?
1 answers
-
What is security and information security? What is the difference?
1 answers
-
States in Security Process
1 answers
-
States in Security Process
1 answers
Popular Topics
Sponsored Content
[Google AdSense Unit - Desktop/Tablet]
Advertisement