Which of the following options is an approach to restricting system access to authorized users?
A.
DAC
B.
MIC
C.
RBAC
D.
MAC
Which of the following options is an approach to restricting system access to authorized users?
Which of the following options is an approach to restricting system access to authorized users?
A.
DAC
B.
MIC
C.
RBAC
D.
MAC