SlideShare uma empresa Scribd logo
1 de 47
Chapter 6 Ensuring Controlled Access
Objectives ,[object Object],[object Object],[object Object]
Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Principles of Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object]
Establishing Identity ,[object Object],[object Object],[object Object]
Passwords: Something You Know ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Passwords: Something You Know ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Passwords: Something You Know ,[object Object],[object Object]
Passwords: Something You Know ,[object Object],[object Object]
Token-Based Security: Something You Have ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Token-Based Security: Something You Have ,[object Object],[object Object],[object Object],[object Object],[object Object]
Biometrics: Something You Are ,[object Object],[object Object],[object Object],[object Object]
Biometrics: Something You Are ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Combining Approaches: Multifactor Authentication ,[object Object],[object Object],[object Object]
Approaches for Establishing Identity in Cyberspace ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Approaches for Establishing Identity in Cyberspace ,[object Object],[object Object],[object Object],[object Object]
Mutual Authentication: Ensuring Identity During Transmission ,[object Object],[object Object],[object Object]
Mutual Authentication: Ensuring Identity During Transmission ,[object Object],[object Object]
Mutual Authentication: Ensuring Identity During Transmission ,[object Object],[object Object]
Authorization: Controlling Access ,[object Object],[object Object],[object Object],[object Object],[object Object]
Policy-Based Access Control ,[object Object]
Discretionary Access Control (DAC) ,[object Object],[object Object]
Discretionary Access Control (DAC) ,[object Object],[object Object]
Discretionary Access Control (DAC) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discretionary Access Control (DAC) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mandatory Access Control (MAC) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mandatory Access Control (MAC) ,[object Object]
Real-World Access Control: Automating the Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Real-World Access Control: Automating the Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Setting Up the System: Account Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion Detection: Backstopping Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intrusion Detection Systems: Keeping the Perimeter Secure ,[object Object],[object Object],[object Object],[object Object]
Types of Intrusion Detection: Automated versus Human Centered ,[object Object],[object Object],[object Object],[object Object],[object Object]
Common Network-Based IDS (NIDS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Network-Based IDS (NIDS) ,[object Object],[object Object],[object Object],[object Object]
Common Network-Based IDS (NIDS) ,[object Object]
Host-Based IDS (HIDS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Assessments: Penetration Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Assessments: Penetration Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Assessments: Penetration Testing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Access Control Models ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Classification-Based Security Models: Bell-LaPadula ,[object Object],[object Object],[object Object]
Classification-Based Security Models: Bell-LaPadula ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Integrity-Based Security Models: Biba ,[object Object],[object Object]
Integrity-Based Security Models: Biba ,[object Object],[object Object],[object Object],[object Object]
Transaction-Based Security Models: Clark-Wilson ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transaction-Based Security Models: Clark-Wilson ,[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 
CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALRonald Jackson, Jr
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnairePriyanka Aash
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSChristina33713
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentDavid Sweigert
 
Security models
Security models Security models
Security models LJ PROJECTS
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Corporation
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Intro To Access Controls
Intro To Access ControlsIntro To Access Controls
Intro To Access ControlsHari Pudipeddi
 

Mais procurados (20)

Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINAL
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
Security models
Security models Security models
Security models
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Security engineering
Security engineeringSecurity engineering
Security engineering
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
U nit 4
U nit 4U nit 4
U nit 4
 
Unit4
Unit4Unit4
Unit4
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Intro To Access Controls
Intro To Access ControlsIntro To Access Controls
Intro To Access Controls
 

Destaque (19)

Honey
HoneyHoney
Honey
 
ISM424 RM
ISM424 RMISM424 RM
ISM424 RM
 
Henz new
Henz newHenz new
Henz new
 
01 Introduction
01 Introduction01 Introduction
01 Introduction
 
02 Computer Evolution And Performance
02  Computer  Evolution And  Performance02  Computer  Evolution And  Performance
02 Computer Evolution And Performance
 
Chapter008
Chapter008Chapter008
Chapter008
 
abc
abcabc
abc
 
02 computer evolution and performance
02 computer evolution and performance02 computer evolution and performance
02 computer evolution and performance
 
Powerpoint Exercise 2
Powerpoint Exercise 2Powerpoint Exercise 2
Powerpoint Exercise 2
 
03 Buses
03 Buses03 Buses
03 Buses
 
10 Instruction Sets Characteristics
10  Instruction  Sets Characteristics10  Instruction  Sets Characteristics
10 Instruction Sets Characteristics
 
Chapter005
Chapter005Chapter005
Chapter005
 
Pentium 3
Pentium 3Pentium 3
Pentium 3
 
09 Arithmetic
09  Arithmetic09  Arithmetic
09 Arithmetic
 
06 External Memory
06  External  Memory06  External  Memory
06 External Memory
 
08 Operating System Support
08  Operating  System  Support08  Operating  System  Support
08 Operating System Support
 
07 Input Output
07  Input  Output07  Input  Output
07 Input Output
 
05 Internal Memory
05  Internal  Memory05  Internal  Memory
05 Internal Memory
 
04 Cache Memory
04  Cache  Memory04  Cache  Memory
04 Cache Memory
 

Semelhante a Chapter006

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challengessidraasif9090
 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxPuskar Bhandari
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authenticationmbadhi
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptxRavikumarVadana
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1osama elfar
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 

Semelhante a Chapter006 (20)

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Comprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security ChallengesComprehensive Analysis of Contemporary Information Security Challenges
Comprehensive Analysis of Contemporary Information Security Challenges
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
 
Unit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptxUnit-4-User-Authentication.pptx
Unit-4-User-Authentication.pptx
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authentication
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
Is4560
Is4560Is4560
Is4560
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdfAccess Control System_ An Overview - Bahaa Abdul Hadi.pdf
Access Control System_ An Overview - Bahaa Abdul Hadi.pdf
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
Access control
Access controlAccess control
Access control
 

Mais de Jeanie Delos Arcos (11)

105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt105_2_digitalSystem_Chap_3_part_3.ppt
105_2_digitalSystem_Chap_3_part_3.ppt
 
Chapter004
Chapter004Chapter004
Chapter004
 
Chapter003
Chapter003Chapter003
Chapter003
 
Pentium II
Pentium IIPentium II
Pentium II
 
Celeron
CeleronCeleron
Celeron
 
80486
8048680486
80486
 
Taralets
TaraletsTaralets
Taralets
 
six part invention
six part inventionsix part invention
six part invention
 
Accidentally InLove
Accidentally InLoveAccidentally InLove
Accidentally InLove
 
Like A Virgin
Like A VirginLike A Virgin
Like A Virgin
 
Awit sa mga Bata
Awit sa mga BataAwit sa mga Bata
Awit sa mga Bata
 

Chapter006

  • 1. Chapter 6 Ensuring Controlled Access
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.