Explain the following database security feature Authorization

CPA-Quantitative-Analysis-Section-4 BLOCK RELEASE

It involves determining the access rights to various system resources (hardware e.g. printers, disk drives, etc or programs e.g. payroll applications, inventory applications, etc). Authorization is done by an authorization policy, which defines activities permitted or prohibited within the system. Authorization mechanisms implement the authorization policy and includes directory of access rights, access control lists (ACL) and access tickets or capabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *