what a user can access based on the data, not the subject’s identity, is called:

Determining what a user can access based on the data, not the subject’s identity, is called:

Determining what a user can access based on the data, not the subject’s identity, is called:

A.
Content-based

B.
Role-based

C.
Rule-based

D.
Capability table

Explanation:
Content-based access controls look at the sensitivity of the data to
determine if a subject can access it or not. Content-dependent access control,
access to objects is determined by the content within the object. Content-dependent
filtering is used when corporations employ e-mail filters that look for specific
strings, such as "confidential","social security number,","top secret," and any other types of words the company deems suspicious.



Leave a Reply 0

Your email address will not be published. Required fields are marked *