Exploring access control models
To help restrict the access rights of your users, there are various types of access control models that can be used to prevent a user from performing an unauthorized action on a system or network. Each of these models has various characteristics that you will learn about here to understand how they are generally deployed in an organization.
Discretionary access control
When using Discretionary Access Control (DAC), the owner of an object can decide which permissions should be assigned to a user who wants access to it. An example of DAC is if you have created a spreadsheet file on a centralized file server that contains work schedules for certain work-related activities with other staff members. Since you are the creator of the file, you also inherit the title of being the owner as well. This means you can choose which users can perform read, write, and/or execute actions on the file. The owner of the object can assign certain users who can read...