Multilayer User Access Control and Implementation

For the construction of secure virtual architectures, the creation of multilayer access control plays an enormous role. The main task of such control is to protect against unauthorized intrusion of fraudsters into the defended object. In particular, one of the models for creating a cybersecurity system can be the principle of mandatory access control (MAC). It is necessary to admit that such a multilayer access control format is mainly intended for the prevention of potential leakage of confidential information from a protected virtual system (“What is mandatory access control,” 2019). Therefore, the basic idea of MAC is that, to each level object of system, the particular digital label that allows describing the index of confidentiality of the information actual for the given information is prescribed. These confidentiality rules are constant: at each interaction with the data, together with a material, the label is also transferred. In classified industries, such as the military or aviation industry, the gradation of such indicators begins with the level of “unclassified” and ends with “top secret” data. In particular, if a user with inappropriate access tries to get classified information, the program will refuse to give their files, and consequently, it is essential that the external labels (which the user has) coincide with the internal ones (which are built into the database) (“Mandatory access control,” 2020). At the same time, a manager with a high level of access can quickly obtain materials from the “unclassified” category. The absolute benefit of this model for the implementation of multilayer access control is the delimitation of access to objects controlled by the system itself. On the other hand, mandatory access control is not complicated in technical execution: the developers need to create rules and assign privacy tags to materials and users.

References

Mandatory access control vs discretionary access control: Which to choose?? (2020). EKRAN. Web.

What is mandatory access control (MAC)? (2019). KISI. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, July 4). Multilayer User Access Control and Implementation. https://studycorgi.com/multilayer-user-access-control-and-implementation/

Work Cited

"Multilayer User Access Control and Implementation." StudyCorgi, 4 July 2022, studycorgi.com/multilayer-user-access-control-and-implementation/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Multilayer User Access Control and Implementation'. 4 July.

1. StudyCorgi. "Multilayer User Access Control and Implementation." July 4, 2022. https://studycorgi.com/multilayer-user-access-control-and-implementation/.


Bibliography


StudyCorgi. "Multilayer User Access Control and Implementation." July 4, 2022. https://studycorgi.com/multilayer-user-access-control-and-implementation/.

References

StudyCorgi. 2022. "Multilayer User Access Control and Implementation." July 4, 2022. https://studycorgi.com/multilayer-user-access-control-and-implementation/.

This paper, “Multilayer User Access Control and Implementation”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.