• Home
  • services
    • On site repairing
    • PPEs
    • IT communication cabling
    • Construction supplies
    • Office supplies and stationary
    • Security systems
    • Physical security
    • Building fire safety
    • Industrial supplies
    • Machinery
    • Power supplies
    • On site repairing
    • Other supplies
  • Clients
  • Contact us
  • About us
  • Home
  • services
    • On site repairing
    • PPEs
    • IT communication cabling
    • Construction supplies
    • Office supplies and stationary
    • Security systems
    • Physical security
    • Building fire safety
    • Industrial supplies
    • Machinery
    • Power supplies
    • On site repairing
    • Other supplies
  • Clients
  • Contact us
  • About us

Access Control Systems

Access control systems are electronic systems that facilitate automated approval for authorized personnel to enter through a security portal without the need for a security officer to review and validate the authorization of the person entering the portal, typically by using a credential to present to the system to verify their authorization.

Discretionary Access Control (DAC):

DAC is a type of access control system that assigns access rights based on rules specified by users. The principle behind DAC is that subjects can determine who has access to their objects. The DAC model takes advantage of using access control lists (ACLs) and capability tables. Capability tables contain rows with ‘subject’ and columns containing ‘object’. The security kernel within the operating system checks the tables to determine if access is allowed. Sometimes a subject/program may only have access to read a file; the security kernel makes sure no unauthorized changes occur.

Role-Based Access Control (RBAC):

RBAC, also known as a non-discretionary access control, is used when system administrators need to assign rights based on organizational roles instead of individual user accounts within an organization. It presents an opportunity for the organization to address the principle of ‘least privilege’. This gives an individual only the access needed to do their job, since access is connected to their job.

Mandatory Access Control (MAC):

Considered the strictest of all levels of access control systems. The design and implementation of MAC is commonly used by the government. It uses a hierarchical approach to control access to files/resources. Under a MAC environment, access to resource objects is controlled by the settings defined by a system administrator. This means access to resource objects is controlled by the operating system based on what the system administrator configured in the settings. It is not possible for users to change access control of a resource. MAC uses “security labels” to assign resource objects on a system. 

Company Profile:

ZB ENTERPRISES (Pvt) Ltd. was established in 2018 with its Head office in Rawalpindi.
The Firm is registered with FBR, Chamber of Commerce and Certified with ISO 9001.
We are a General Trading Enterprise that serves the entire satisfaction of our valued clients.

Services:

  • Security system
  • On site Repair
  • Machinery
  • Construction
  • Industrial supplies
  • Other supplies
  • PPE's
  • IT & Communication
  • Office supplies
  • Building fire
  • Power supplies
  • Physical security
WordPress Themes

created with

WordPress Theme Builder .