The following is an access verification technique, listing several files and the access allowed for a single use.
Identify the control technique used here and for each, explain the type of access allowed.
a. File_1 R-E-
b. File_12 RWE
c. File_13 RW–
d. File_14 –E-
2.
. The following is an access verification technique, listing several users and the access allowed for File_13. Identify the control technique used here and for each and explain the type of access allowed.
Finally, describe who is included in the WORLD category.
a. User_10 –E-
b. User_14 RWED
c. User_17 RWE-
d. WORLD R—