189k views
5 votes
A certain amount of access control is left to the discretion of the object's owner, or anyone else who is authorized to control the object's access. The owner can determine who should have access rights to an object and what those rights should be. NIST SP 800-192

1 Answer

5 votes

Final answer:

In Discretionary Access Control (DAC), the owner or authorized individuals have the discretion or control over access rights to an object. The correct answer is B.

Step-by-step explanation:

They can determine who should have access to the object and what specific rights they should have. This means that the owner has the freedom to grant or revoke access to the object based on their own judgment or discretion.

For example, in a computer system, the owner of a file can decide which users or groups of users should have access to that file and whether they can read, write, or modify it. The owner can also choose to restrict access to certain individuals or grant access to specific users based on their roles or responsibilities.

DAC allows for flexibility and customization in access control, as it puts the control in the hands of the object's owner. However, it also requires a high level of trust in the owner's decision-making and responsibility to ensure that access rights are granted appropriately.

In contrast, other access control models such as Mandatory Access Control (MAC), Role-Based Access Control (RBAC), and Rule-Based Access Control (RuBAC) have different mechanisms for determining access rights, often based on predefined rules or policies rather than the discretion of the object's owner.

The correct answer is B. Discretionary Access Control (DAC).

Your question is incomplete, but most probably the full question was:

A certain amount of access control is left to the discretion of the object's owner, or anyone else who is authorized to control the object's access. The owner can determine who should have access rights to an object and what those rights should be. NIST SP 800-192

A. Mandatory Access Control (MAC)

B. Discretionary Access Control (DAC)

C. Role-Based Access Control (RBAC)

D. Rule-Based Access Control (RuBAC)

User Jothi Kannan
by
8.8k points