Dac (discretionary access control) relies only on the identity of the user or process, leaving room for a trojan horse. -in a dac model, network users have some flexibility regarding how information is accessed. this model allows users to dynamically share information with other users. the process allows a more flexible environment, but it increases the risk of unauthorized disclosure of information. administrators will have a more difficult time ensuring that information access is controlled and that only appropriate access is given.reference: mike pastore and emmett dulaney, security+ study guide, 2nd edition, alameda, sybex, 2004, p 440