Cybersecurity Fundamentals — Hard
Key points
- MAC is system-enforced with security labels
- DAC allows resource owners control over access
- Users cannot override MAC policies
- DAC permissions are discretionary
- MAC is more restrictive than DAC
Ready to go further?
Related questions
