Discretionary access control systems offer a flexible approach to authorization, allowing users to assign access permissions to other users -- the owners of files, computers, and other resources have the discretion to configure permissions as they see fit. Discretionary access control systems are the most common form of access control because they provide organizations with needed flexibility. Explore the concept of discretionary access controls in this video.
- [Instructor] Discretionary access control systems…offer a flexible approach to authorization allowing users…to assign access permissions to other users.…The owners of files, computers, and other resources…have the discretion to configure permissions…as they see fit.…Discretionary access control systems are the most common…form of access control because they provide organizations…with needed flexibility.…Imagine if users in your organization…didn't have the ability to assign file rights to other users…as needed and IT had to be involved in every request.…
That would certainly make life difficult, wouldn't it?…Let's look at an example…of a discretionary access control system.…Imagine that we have a file containing information…on some of the organization's employees.…Alice, an analyst within human resources, created the file…and the operating system recognizes her as the file owner.…Alice however, created this file at Bob's request…and she wants Bob to have permission to do everything that…Alice can do.…So Alice gives Bob full control permission over that file.…
You can sign up for Mike's free study group at certmike.com, and find his study guides at the Sybex test prep site. To review the complete CISSP Body of Knowledge, visit https://www.isc2.org/cissp-domains/default.aspx.
Note: This course is part of a series releasing throughout 2018. A complete learning path will be available once all the courses are released.
- Identity and access management overview
- Identification mechanisms: user names, access cards, biometrics, and registration
- Authentication factors
- Password authentication protocols
- Identity as a service (IDaaS)
- Enforcing accountability
- Managing credentials with policies
- Using access control lists
- Defending against access control attacks
Skill Level Advanced
1. Identity and Access Management
5. Credential Management
7. Access Control Attacks
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.