article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Because discretionary access control policies share this transitive characteristic and also are particularly vulnerable to Trojan horse attacks, these policies should be limited to contexts with non-sensitive data or among a trusted subset of users. Mandatory Access Control. Role-Based Access Control.