News
Seven days of Black Friday madness — great deal from Serverspace!

THE NEW YEAR
WHEEL OF FORTUNE

Spin the wheel and win a guaranteed prize right now!

By registering, you are signing up to receiving emails.
DF
Daniil Fedorov
July 15 2024
Updated July 15 2024

Discretionary access control model

The discretionary access control model is a method of access management in which the administrator or resource owner has the authority to determine who has access to the resource and what permissions they possess. This grants the decision-maker complete control over the access process, allowing them to establish access rules for each user or user group.

Usage

The discretionary access control model is extensively utilized in information management systems and computer networks, particularly those requiring strict control over access to confidential data or resources. However, it has limitations such as the difficulty in managing a large number of users, lack of granular access control, and inadequate protection against unauthorized actions by users.

In modern access management systems, more sophisticated models such as mandatory access control, role-based access control, or attribute-based access control are often employed, offering a more flexible and convenient approach to managing resource access.

Weaknesses

The essential weakness of the discretionary access control model is that control rights are vested in the resource owner or system administrator, potentially leading to abuse or unauthorized actions. Furthermore, this model does not consistently provide effective protection against internal threats like information breaches or malicious activities by employees.

To address these shortcomings, contemporary security systems often incorporate more complex and refined access models, ensuring more flexible and effective control over resource access.

We use cookies to make your experience on the Serverspace better. By continuing to browse our website, you agree to our
Use of Cookies and Privacy Policy.