About This Chapter
Data Access Control - Chapter Summary
If you need help understanding the basics of data access control, look no further! This chapter is filled with engaging lessons you can study at your own pace to boost your comprehension of data sensitivity, security zones, the access control matrix and other related topics. Each lesson is paired with a short quiz designed to quickly check your knowledge of main concepts. A broader exam is available to assess your understanding of the entire chapter. If you have a busy schedule, around-the-clock access makes it easy to study whenever your schedule permits. Upon completion of this chapter, you will be ready to:
- Define and share examples of data sensitivity and criticality
- List types of access control and discuss its implementation
- Describe and provide an example of the access control matrix
- Explain the purpose of security zones
- Detail the uses of cryptography
1. Data Sensitivity & Criticality: Definition & Examples
Data sensitivity and criticality are important considerations when classifying the security of information. In this lesson, you'll learn more about these terms and the various classification levels of government and private sectors.
2. Access Control: Types & Implementation
Access control is a critical element of any security implementation. In this lesson, we will identify and describe the various types of access controls, and provide an example implementation of access control in a business.
3. Access Control Matrix: Model & Example
An access control matrix is a single digital file assigning users and files different levels of security. We'll talk about access control models including: mandatory access, role-based access, discretionary access, and rule-based access.
4. Security Zones: Definition & Purpose
In this lesson, we will define a security zone and discuss the importance of these zones. We will also discuss the goals of a security zone and how they are established.
5. What is Cryptography? - Definition & Uses
In this lesson, we will examine the interesting world of cryptography. Securing our data and systems from malicious intruders, system glitches, and human errors have become paramount in modern systems.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 332: Cybersecurity Policies and Management course
- Intro to Cybersecurity
- The Cybersecurity Threat Landscape
- Information Security Policy
- Information Security Strategy Development
- Cybersecurity Policy, Governance & Management
- Cybersecurity Risk Management
- Partner & Vendor Security Management
- Security Awareness Training
- Information Security Compliance
- Information Security Performance Metrics
- Required Assignments for Computer Science 332