which logical flow?

You are looking to implement an access control on your systems resources. The steps of your access control model should follow which logical flow?

You are looking to implement an access control on your systems resources. The steps of your access control model should follow which logical flow?

A.
Identification, Authorization, Authentication

B.
Authorization, Identification, Authentication

C.
Identification, Authentication, Authorization

D.
Identification, Accountability, Authorization

Explanation:
Identification describes a method of ensuring that a subject (user, program, orprocess) is the entity it claims to be. Identification can be provided with the use of a username or account number. To be properly authenticated, the subject isusually required to provide a second piece to the credential set. This piece could be a password, passphrase, cryptographic key, personal identification number (PIN),anatomical attribute, or token. If the system determines that the subject may accessthe resource, it authorizes the subject.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


networkmanagers

networkmanagers

I choose C