:
1. .
2. .
1. :
.
.
.
.
.
(. authorisation) .
(. Mandatory access control, MAC) , , , () .
2, , , . , " 1 , .
. 5.1.
; ; ; .
(. Discretionary access control, DAC) .
( ) (, . .), , ().
. 5.2.
1 3, 2 . " 2 1, 2, .
(. Role Based Access Control, RBAC) , , .
. , .
. , ( ), . , .
|
|
, ( ), . , .
- ( - ) (, ). .
, , . , .
2. :
;
.
(. Intrusion Detection System (IDS)) , .
.
, . , , , , ( , )
:
, , ;
, ;
, ;
, , , .
(. Data Leak Prevention, DLP) , , - .
DLP- , . , (, , ) .