John needs to be able to use an access control technology that enforces thefollowing rules; If the user is accessing the system between Monday and Friday andbetween 8 A.M. and 5 P.M., and if the user’s security clearance equals or dominatesthe object’s classification, and if the user has the necessary need to know, thenthe user can access the object. What type of access control technology does Johnneed to implement?
A.
Rule-based
B.
Time-based
C.
Role-based
D.
Mandatory-based
Explanation:
Rule-based access control uses specific rules that indicate what can and cannothappen between a subject and an object. It is based on the simple concept of"if X then Y" programming rules, which can be used to providefiner-grained access control to resources. Before a subject can access an object ina certain circumstance, it must meet a set of predefined rules. This can be simpleand straightforward, as in "if the user’s ID matches the unique user ID valuein the provided digital certificate, then the user can gain access." Or therePage 13cess trol-P3.txtcould be a set of complex rules that must be met before a subject can access anobject.