0% found this document useful (0 votes)
29 views12 pages

Os PPT1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views12 pages

Os PPT1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Introduction to Access Matrix

An access matrix is a security model that


describes the rights of subjects on objects. It is a
table-based approach that outlines who can access
what resources.
Components of an Access Matrix
Subjects Objects Access Rights

Entities like processes, users, Resources such as files, Permissions such as read,
or systems. databases, or devices. write, execute, or delete.
Examples of Access Matrix

1 File Permissions 2 Database Access 3 Access Control


Lists
Illustrating which users Detailing which
can read, write, or applications can access Defining particular
execute a file. specific tables or fields. access rights for
different users or groups.
Domain Switching with Matrix Table
Role Resource Permissions

Admin Finance System Read, Write, Execute

Guest Customer Database Read


Access Rights in Access Matrix
1 Read
Allows viewing but not modifying data.

2 Write
Grants the ability to modify or add data.

3 Execute
Provides the authority to run programs or scripts.
Copy and Owner Rights
Copy Right Owner Right
Permission to duplicate or replicate a Full control and authority over a resource.
resource.
Control Rights in Access Matrix
Delegate
Assigning access management responsibility to others.

Revoke
Removing previously assigned access privileges.

Grant
Bestowing access rights to a particular resource or system.
Conclusion
Access matrices are a critical component of security architectures, providing
granular control over access. Understanding their structure and implementation is
fundamental for robust security policies.

You might also like