In this article we propose a review of four major models of access control. There is a description of functioning principles of each model. Also a brief analysis of possible insider threats is presented. And we propose a possible fragmentation of the basic scenarios to specific threats.
access control, access control model, threat scenarios, insider