1.6.9

Authentication: User Access Levels

Test yourself on Authentication: User Access Levels

Test your knowledge with free interactive questions on Seneca — used by over 10 million students.

User Access Levels

One technique to improve the security of a network is using user access levels.

Access rights

Access rights

  • Users of a computer system can be given different access rights for different files on the system.
  • For example, for each file on the system we might keep a record of whether each user can:
    • Read the file.
    • Write to the file.
    • Execute the file.
User access levels

User access levels

  • Network users can be arranged into user groups.
  • Each group can then be given different access rights.
  • This makes it easy to manage the access rights of a large group of people (e.g. employees).
Advantages of user access levels

Advantages of user access levels

  • We can limit the access rights of 'normal' users on the network. For example:
    • Not allowing them to install software.
    • Not allowing them to create new user accounts.
    • Not allowing them access to confidential information.
  • These rights can be limited to the administrators only.
Jump to other topics
1

Computer Systems

1.1

Data Representation

1.2

Data Transmission

1.3

Hardware

1.4

Software

1.5

The Internet & its Uses

1.6

Cyber Security

1.7

Automated & Emerging Technologies

2

Algorithms, Programming & Logic

Practice questions on Authentication: User Access Levels

Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.

  1. 1
  2. 2
Answer all questions on Authentication: User Access Levels

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium