1.6.9

Authentication: User Access Levels

Test yourself

User Access Levels

One technique to improve the security of a network is using user access levels.

Illustrative background for Access rightsIllustrative background for Access rights ?? "content

Access rights

  • Users of a computer system can be given different access rights for different files on the system.
  • For example, for each file on the system we might keep a record of whether each user can:
    • Read the file.
    • Write to the file.
    • Execute the file.
Illustrative background for User access levelsIllustrative background for User access levels ?? "content

User access levels

  • Network users can be arranged into user groups.
  • Each group can then be given different access rights.
  • This makes it easy to manage the access rights of a large group of people (e.g. employees).
Illustrative background for Advantages of user access levelsIllustrative background for Advantages of user access levels ?? "content

Advantages of user access levels

  • We can limit the access rights of 'normal' users on the network. For example:
    • Not allowing them to install software.
    • Not allowing them to create new user accounts.
    • Not allowing them access to confidential information.
  • These rights can be limited to the administrators only.

Jump to other topics

1Computer Systems

1.1Data Representation

1.2Data Transmission

1.3Hardware

1.4Software

1.5The Internet & its Uses

1.6Cyber Security

1.7Automated & Emerging Technologies

2Algorithms, Programming & Logic

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium