1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
7

Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization

enforces what a user can do Access control proves a user's identify and authorization creates a log of their activities Authorization specifies what a user can do, and access control enforces what a user can do Authorization proves a user's identify and access control creates a log of their activities
Computers and Technology
2 answers:
spayn [35]3 years ago
5 0
<h2>Answer:</h2>

Authorization specifies what a user can do, and access control enforces what a user can do.

<h2>Explanation:</h2>

Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.

Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.

SpyIntel [72]3 years ago
4 0

Answer:

Authorization specifies what a user can do, and access control enforces what a user can do

Explanation:

Authorization is one of three features in information security access control policies, with the other two being authentication and accounting. Authorization is the required credential of a user needed to access the user account. It is used as a access control process on the account usable features.

The access control is a mechanism in information security technology that is used to specify how data should be accessed. It enforces what a user can do in a network

You might be interested in
What is the maximum amount of memory that vmachine1 can use in its current configuration with startup ram set to 1024 megabytes?
lidiya [134]

The answer is 1024MB.

I am really not in a position to answer this question fully since the lab is not provided but according to the research conducted online, the answer is 1024MB. According to the book, based on the physical memory installed on the PC, the current system shows 1.06GB which is equivalent to 1060MB. Thus, it is able to use all 1024MB.






7 0
3 years ago
Write an algorithm of telephone call system​
ivolga24 [154]

Answer:

this is the correct answer

3 0
2 years ago
Read 2 more answers
I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
Bumek [7]

dvioubfeevuf is hsvqvuvsqv

5 0
3 years ago
What do you think about the use the top song on a video you are creating
stepladder [879]

Hiya!


Using a popular song in a video your making is most definitely going to attract more viewers. It's all about making the video appeal to the person.

^Hope this helps

3 0
3 years ago
Read 2 more answers
Is a collection of information stored under a single nam​
ad-work [718]

Answer:

<h2><em>File</em></h2>

plz mark it as brainliest

8 0
3 years ago
Read 2 more answers
Other questions:
  • On the Insert tab, select Table &gt; _______ to create a table from selected text.
    14·1 answer
  • Plz help! 3 questions! 1.The ideal light to use is.... A.front light B.a combination of side and back light C.a combination of f
    10·1 answer
  • Can somebody explain me what this code does in a few or one sentence?#include #include using namespace std;int main () { const i
    12·1 answer
  • Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example
    12·2 answers
  • Casey, a woodworker, is developing his own website. He plans to use the site as a means of selling his handmade furniture. While
    10·1 answer
  • which of the following is a component of a rope-rewind starter system? a. a recoil spring c. an air vane governor b. a wrist pin
    5·1 answer
  • An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The pho
    12·1 answer
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    5·1 answer
  • Missy loves her old Windows games. When she upgrades her Windows system, the games run fine, but the output looks fuzzy since th
    15·1 answer
  • What is the difference between HTML and XML?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!