DAC stands for Discretionary Access Control. | MAC stands for Mandatory Access Control. |
DAC is easier to implement. | MAC is difficult to implement. |
DAC is less secure to use. | MAC is more secure to use. |
In DAC, the owner can determine the access and privileges and can restrict the resources based on the identity of the users. | In MAC, the system only determines the access and the resources will be restricted based on the clearance of the subjects. |
DAC has extra labor-intensive properties. | MAC has no labor-intensive property. |
Users will be provided access based on their identity and not using levels. | Users will be restricted based on their power and level of hierarchy. |
DAC has high flexibility with no rules and regulations. | MAC is not flexible as it contains lots of strict rules and regulations. |
DAC has complete trust in users. | MAC has trust only in administrators. |
Decisions will be based only on user ID and ownership. | Decisions will be based on objects and tasks, and they can have their own ids. |
Information flow is impossible to control. | Information flow can be easily controlled. |
DAC is supported by commercial DBMSs. | MAC is not supported by commercial DBMSs. |
DAC can be applied in all domains. | MAC can be applied in the military, government, and intelligence. |
DAC is vulnerable to trojan horses. | MAC prevents virus flow from a higher level to a lower level. |