A key component to IT security is authorization, which is especially important in large, complex organizations with thousands of employees and hundreds of systems. Two methods of authorization are role based access control (RBAC) and attribute based access control (ABAC). Although RBAC and ABAC can provide the same access, which of the following is an advantage of ABAC? In ABAC, roles are expressed more in business terms and thus may be more understandable. In ABAC, roles are expressed more in business terms and thus may be less understandable. none
+2
Answers (1)
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “A key component to IT security is authorization, which is especially important in large, complex organizations with thousands of employees ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Home » Computers & Technology » A key component to IT security is authorization, which is especially important in large, complex organizations with thousands of employees and hundreds of systems.