NIST RBAC Model: The NIST RBAC model comprises four model components (Figure 3.3): which are core RBAC, hierarchical RBAC, static separation of duty (SSD) relations, and dynamic separation of duty (DSD) relations. 2.3 RESEARCH GAP Zoning is used to provide security in Storage Area Network by preventing the unauthorized access. Although there are two methods of Zoning, they have some advantages and drawbacks. WWN zoning provides flexibility but it is susceptible to spoofing, while port zoning provide
Introduction The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order