What is mandatory access procedure?
Access control (MAC) is access to system security where the administrator sets the access controls and the system enforces them without allowing users to rewrite the security settings. This may be a more aggressive way to control the access to the system and can be used in situations where computers contain confidential or potentially threatening data. The system decides which users, processes and devices should have access to which areas and enforce it across the board. This allows administrators to fine -tune access to the system. Once these settings are implemented, it can only be rewritten by the administrator. The system cannot provide access to the entity without properly permit, even if it attempts to rewrite the settings. This applies not only to computer users, but also all devices and processes connected to the system.
thje in contrast to another approach, known as discretion control of access. In this model, users can rewrite security settings; For example, the user could communicate the directory to viewIL All hidden files, and he would have to do it. This is less secure because users decide how much they should have access. If they encounter access barriers, they can easily work around them rather than being reflected in an area where they should not be, as under a compulsory access control.
For a high -security system, compulsory access management is very important. Such systems rely on controls to maintain the safety and confidentiality of information. Government agencies, financial companies and other organizations that maintain complex and personal data must keep them safe. Sometimes this is ordered by law and these organizations must be able to provide proof of access control and other measures to stretch data when inspectors and auditors ask for it.
In other settings, mandatory access management may not be required, but it may be useful. AdministratorsTo use users from preventing places where they may not be, and to prevent problems such as unintentional changes to the settings made by users who are not informed about the computer system. In a situation where more people use a single computer terminal, mandatory access can prevent unauthorized activities. It can also reduce opportunities to send data to peripheral devices or processes in an effort to solve security measures.