SlideShare uma empresa Scribd logo
1 de 19
ACCESS CONTROLS
INTRODUCTION
ā€¢ USERS FIRST MUST BE IDENTIFIED AS AUTHORIZED USER,
SUCH AS BY LOGGING IN WITH USER NAME AND PASSWORD
TO LAPTOP COMPUTER
ā€¢ BECAUSE LAPTOP CONNECTS TO CORPORATE NETWORK THAT
CONTAINS CRITICAL DATA, IMPORTANT ALSO TO RESTRICT
USER ACCESS TO ONLY SOFTWARE, HARDWARE, AND OTHER
RESOURCES FOR WHICH USER HAS BEEN APPROVED
ā€¢ THESE TWO ACTSā€”AUTHENTICATING ONLY APPROVED USERS
AND CONTROLLING THEIR ACCESS TO RESOURCESā€”ARE
IMPORTANT FOUNDATIONS IN INFORMATION SECURITY
WHAT IS ACCESS CONTROL?
ā€¢ ACCESS CONTROL - GRANTING OR DENYING APPROVAL TO
USE SPECIFIC RESOURCES; IT IS CONTROLLING ACCESS
ā€¢ PHYSICAL ACCESS CONTROL - FENCING, HARDWARE DOOR
LOCKS, AND MANTRAPS THAT LIMIT CONTACT WITH DEVICES
ā€¢ TECHNICAL ACCESS CONTROL - TECHNOLOGY RESTRICTIONS
THAT LIMIT USERS ON COMPUTERS FROM ACCESSING DATA
ACCESS CONTROL TERMINOLOGY
ā€¢ IDENTIFICATION - PRESENTING CREDENTIALS (EXAMPLE:
DELIVERY DRIVER PRESENTING EMPLOYEE BADGE)
ā€¢ AUTHENTICATION - CHECKING CREDENTIALS (EXAMPLE:
EXAMINING THE DELIVERY DRIVERā€™S BADGE)
ā€¢ AUTHORIZATION - GRANTING PERMISSION TO TAKE ACTION
(EXAMPLE: ALLOWING DELIVERY DRIVER TO PICK UP PACKAGE)
TECHNICAL ACCESS CONTROL PROCESS
ACCESS CONTROL MODELS
ā€¢ ACCESS CONTROL MODEL - HARDWARE AND SOFTWARE
PREDEFINED FRAMEWORK THAT CUSTODIAN CAN USE FOR
CONTROLLING ACCESS
ā€¢ ACCESS CONTROL MODELS USED BY CUSTODIANS FOR ACCESS
CONTROL ARE NEITHER CREATED NOR INSTALLED BY
CUSTODIANS OR USERS; INSTEAD, THESE MODELS ARE ALREADY
PART OF SOFTWARE AND HARDWARE.
ā€¢ ACCESS CONTROL MODELS
ā€¢ DAC - LEAST RESTRICTIVE MODEL
ā€¢ MAC - OPPOSITE OF DAC AND IS MOST RESTRICTIVE ACCESS
CONTROL MODEL
ā€¢ UAC - USER/ADMIN LEVEL MODEL THAT NOTIFIES OR REQUIRES
AUTHENTICATION PRIOR TO GRANTING ACCESS
DISCRETIONARY ACCESS CONTROL (DAC)
ā€¢ DISCRETIONARY ACCESS CONTROL (DAC) - LEAST
RESTRICTIVE MODEL
ā€¢ EVERY OBJECT HAS OWNER, WHO HAS TOTAL CONTROL OVER
THAT OBJECT
ā€¢ OWNERS CAN CREATE AND ACCESS THEIR OBJECTS FREELY
ā€¢ OWNER CAN GIVE PERMISSIONS TO OTHER SUBJECTS OVER
THESE OBJECTS
ā€¢ DAC USED ON OPERATING SYSTEMS LIKE UNIX AND
MICROSOFT WINDOWS
ā€¢ DAC HAS TWO SIGNIFICANT WEAKNESSES:
ā€¢ DAC RELIES ON DECISIONS BY END-USER TO SET PROPER LEVEL OF SECURITY; INCORRECT
PERMISSIONS MIGHT BE GRANTED TO SUBJECT OR PERMISSIONS MIGHT BE GIVEN TO
UNAUTHORIZED SUBJECT
ā€¢ SUBJECTā€™S PERMISSIONS WILL BE ā€œINHERITEDā€ BY ANY PROGRAMS THAT SUBJECT EXECUTES;
ATTACKERS OFTEN TAKE ADVANTAGE OF THIS INHERITANCE BECAUSE END-USERS
MANDATORY ACCESS CONTROL (MAC)
ā€¢ MANDATORY ACCESS CONTROL (MAC) - OPPOSITE OF DAC
AND IS MOST RESTRICTIVE ACCESS CONTROL MODEL
ā€¢ MAC ASSIGNS USERSā€™ ACCESS CONTROLS STRICTLY
ACCORDING TO CUSTODIANā€™S DESIRES AND USER HAS NO
FREEDOM TO SET ANY CONTROLS
ā€¢ TWO KEY ELEMENTS TO MAC:
ā€¢ LABELS - EVERY ENTITY IS AN OBJECT (LAPTOPS, FILES,
PROJECTS, AND SO ON) AND ASSIGNED CLASSIFICATION LABEL
(CONFIDENTIAL, SECRET, AND TOP SECRET) WHILE SUBJECTS
ASSIGNED PRIVILEGE LABEL (A CLEARANCE)
ā€¢ LEVELS - HIERARCHY BASED ON LABELS IS ALSO USED, BOTH
FOR OBJECTS AND SUBJECTS (TOP SECRET HIGHER LEVEL THAN
SECRET)
MANDATORY ACCESS CONTROL (MAC):
MAJOR IMPLEMENTATIONS
ā€¢ LATTICE MODEL - SUBJECTS AND OBJECTS ARE ASSIGNED
ā€œRUNGā€ ON LATTICE AND MULTIPLE LATTICES CAN BE PLACED
BESIDE EACH OTHER
ā€¢ BELL-LAPADULA - SIMILAR TO LATTICE MODEL BUT SUBJECTS
MAY NOT CREATE NEW OBJECT OR PERFORM SPECIFIC
FUNCTIONS ON LOWER LEVEL OBJECTS
ā€¢ BIBA INTEGRITY MODEL - GOES BEYOND BLP MODEL AND
ADDS PROTECTING DATA INTEGRITY AND CONFIDENTIALITY
ā€¢ MANDATORY INTEGRITY CONTROL (MIC) - BASED ON BIBA
MODEL, MIC ENSURES DATA INTEGRITY BY CONTROLLING
ACCESS TO SECURABLE OBJECTS
WINDOWS USER ACCOUNT CONTROL (UAC)
ROLE BASED ACCESS CONTROL (RBAC)
ā€¢ ROLE BASED ACCESS CONTROL (RBAC) - CONSIDERED MORE
ā€œREAL-WORLDā€ ACCESS CONTROL THAN OTHER MODELS
BECAUSE ACCESS BASED ON USERā€™S JOB FUNCTION WITHIN
ORGANIZATION
ā€¢ INSTEAD OF SETTING PERMISSIONS FOR EACH USER OR
GROUP ASSIGNS PERMISSIONS TO PARTICULAR ROLES IN
ORGANIZATION AND THEN ASSIGNS USERS TO THOSE ROLES
ā€¢ OBJECTS ARE SET TO BE A CERTAIN TYPE, TO WHICH SUBJECTS
WITH THAT PARTICULAR ROLE HAVE ACCESS
ā€¢ SUBJECTS MAY HAVE MULTIPLE ROLES ASSIGNED TO THEM
RULE BASED ACCESS CONTROL (RBAC)
ā€¢ RULE BASED ACCESS CONTROL (RBAC) - DYNAMICALLY
ASSIGN ROLES TO SUBJECTS BASED ON SET OF RULES DEFINED
BY CUSTODIAN
ā€¢ EACH RESOURCE OBJECT CONTAINS SET OF ACCESS
PROPERTIES BASED ON RULES
ā€¢ WHEN USER ATTEMPTS TO ACCESS THAT RESOURCE, SYSTEM
CHECKS RULES CONTAINED IN OBJECT TO DETERMINE IF
ACCESS IS PERMISSIBLE
ACCESS CONTROL MODELS
BEST PRACTICES FOR ACCESS CONTROL
ā€¢ ESTABLISHING BEST PRACTICES FOR LIMITING ACCESS CAN HELP
SECURE SYSTEMS AND DATA
ā€¢ A FEW BEST PRACTICES:
ā€¢ SEPARATION OF DUTIES - NOT TO GIVE ONE PERSON TOTAL CONTROL
ā€¢ JOB ROTATION - INDIVIDUALS PERIODICALLY MOVED BETWEEN JOB
RESPONSIBILITIES
ā€¢ LEAST PRIVILEGE - LIMITING ACCESS TO INFORMATION BASED ON WHAT
IS NEEDED TO PERFORM A JOB FUNCTION
ā€¢ IMPLICIT DENY - IF CONDITION IS NOT EXPLICITLY MET, ACCESS REQUEST
IS REJECTED
ā€¢ MANDATORY VACATIONS - LIMITS FRAUD, BECAUSE PERPETRATOR MUST
BE PRESENT DAILY TO HIDE FRAUDULENT ACTIONS
IMPLEMENTING ACCESS CONTROL
ā€¢ NOW THAT WE HAVE DISCUSSED THE MODELS THAT CAN BE
IMPLEMENTED IT IS TIME TO EXAMINE THE TECHNOLOGIES
USED TO IMPLEMENT ACCESS CONTROL:
ā€¢ ACCESS CONTROL LISTS
ā€¢ GROUP POLICY
ā€¢ ACCOUNT RESTRICTIONS
ACCESS CONTROL LISTS (ACLS)
ā€¢ ACCESS CONTROL LIST (ACL) - SET OF PERMISSIONS
ATTACHED TO AN OBJECT
ā€¢ SPECIFIES WHICH SUBJECTS MAY ACCESS THE OBJECT AND
WHAT OPERATIONS THEY CAN PERFORM
ā€¢ WHEN SUBJECT REQUESTS TO PERFORM AN OPERATION
SYSTEM CHECKS ACL FOR AN APPROVED ENTRY
ā€¢ ACLS USUALLY VIEWED IN RELATION TO OPERATING SYSTEM
FILES
ā€¢ EACH ENTRY IN THE ACL TABLE IS CALLED ACCESS CONTROL
ENTRY (ACE)
ā€¢ ACE STRUCTURE (WINDOWS)
ā€¢ SECURITY IDENTIFIER FOR THE USER OR GROUP ACCOUNT OR LOGON SESSION
ā€¢ ACCESS MASK THAT SPECIFIES ACCESS RIGHTS CONTROLLED BY ACE
ā€¢ FLAG THAT INDICATES TYPE OF ACE
ACCESS CONTROL LIST (ACLS):
LIMITATIONS
ā€¢ ALTHOUGH WIDELY USED, ACLS HAVE LIMITATIONS:
ā€¢ USING ACLS IS NOT EFFICIENT - ACL FOR EACH FILE, PROCESS,
OR RESOURCE MUST BE CHECKED EVERY TIME THE RESOURCE IS
ACCESSED.
ā€¢ CAN BE DIFFICULT TO MANAGE IN AN ENTERPRISE SETTING
WHERE MANY USERS NEED TO HAVE DIFFERENT LEVELS OF
ACCESS TO MANY DIFFERENT RESOURCES; SELECTIVELY ADDING,
DELETING, AND CHANGING ACLS ON INDIVIDUAL FILES, OR EVEN
GROUPS OF FILES, CAN BE TIME-CONSUMING AND OPEN TO
ERRORS, PARTICULARLY IF CHANGES MUST BE MADE
FREQUENTLY
GROUP POLICIES
ā€¢ GROUP POLICY - MICROSOFT WINDOWS FEATURE THAT
PROVIDES CENTRALIZED MANAGEMENT AND CONFIGURATION
OF COMPUTERS AND REMOTE USERS USING ACTIVE
DIRECTORY (AD)
ā€¢ USUALLY USED IN ENTERPRISE ENVIRONMENTS
ā€¢ SETTINGS STORED IN GROUP POLICY OBJECTS (GPOS)
ā€¢ LOCAL GROUP POLICY HAS FEWER OPTIONS THAN A GROUP
POLICY AND USED TO CONFIGURE SETTINGS FOR SYSTEMS
NOT PART OF AD
ACCOUNT RESTRICTIONS
TIME OF DAY RESTRICTIONS
ā€¢ TIME OF DAY RESTRICTIONS - LIMITS
THE TIME OF DAY A USER MAY LOG
ONTO A SYSTEM
ā€¢ TIME BLOCKS FOR PERMITTED ACCESS
ARE CHOSEN
ā€¢ CAN BE SET ON INDIVIDUAL SYSTEMS
ACCOUNT EXPIRATION
RESTRICTIONS
ā€¢ ORPHANED ACCOUNTS - ACCOUNTS THAT
REMAIN ACTIVE AFTER EMPLOYEE HAS LEFT
ORGANIZATION
ā€¢ DORMANT ACCOUNTS ā€“ ACCOUNTS NOT
ACCESSED FOR LENGTHY PERIOD OF TIME
ā€¢ BOTH CAN BE SECURITY RISKS
ā€¢ ACCOUNT EXPIRATION - PROCESS OF
SETTING A USERā€™S ACCOUNT TO EXPIRE
ā€¢ ACCOUNT EXPIRATION CAN BE EXPLICIT
(ACCOUNT EXPIRES ON A SET DATE) OR
BASED ON SPECIFIC NUMBER OF DAYS OF
INACTIVITY

Mais conteĆŗdo relacionado

Mais procurados

Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control FundamentalsInformation Technology
Ā 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
Ā 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
Ā 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
Ā 
Network security
Network securityNetwork security
Network securityEstiak Khan
Ā 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
Ā 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
Ā 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
Ā 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
Ā 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin BishtNitin Bisht
Ā 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
Ā 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
Ā 
Types of attacks
Types of attacksTypes of attacks
Types of attacksVivek Gandhi
Ā 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
Ā 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
Ā 
8 Access Control
8 Access Control8 Access Control
8 Access ControlAlfred Ouyang
Ā 
Network security
Network securityNetwork security
Network securityGichelle Amon
Ā 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
Ā 

Mais procurados (20)

Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
Ā 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
Ā 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
Ā 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ā 
Network security
Network securityNetwork security
Network security
Ā 
System security
System securitySystem security
System security
Ā 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Ā 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
Ā 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
Ā 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
Ā 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
Ā 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
Ā 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
Ā 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Ā 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Ā 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
Ā 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ā 
8 Access Control
8 Access Control8 Access Control
8 Access Control
Ā 
Network security
Network securityNetwork security
Network security
Ā 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Ā 

Destaque

Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
Ā 
Rule-Based Access-Control Evaluation through Model-Transformation
Rule-Based Access-Control Evaluation through Model-TransformationRule-Based Access-Control Evaluation through Model-Transformation
Rule-Based Access-Control Evaluation through Model-TransformationJordi Cabot
Ā 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access ControlChandra Sharma
Ā 
Access Control Models: Controlling Resource Authorization
Access Control Models: Controlling Resource AuthorizationAccess Control Models: Controlling Resource Authorization
Access Control Models: Controlling Resource AuthorizationMark Niebergall
Ā 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
Ā 
Attribute based access control
Attribute based access controlAttribute based access control
Attribute based access controlElimity
Ā 
Intro To Access Controls
Intro To Access ControlsIntro To Access Controls
Intro To Access ControlsHari Pudipeddi
Ā 

Destaque (7)

Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
Ā 
Rule-Based Access-Control Evaluation through Model-Transformation
Rule-Based Access-Control Evaluation through Model-TransformationRule-Based Access-Control Evaluation through Model-Transformation
Rule-Based Access-Control Evaluation through Model-Transformation
Ā 
Attribute Based Access Control
Attribute Based Access ControlAttribute Based Access Control
Attribute Based Access Control
Ā 
Access Control Models: Controlling Resource Authorization
Access Control Models: Controlling Resource AuthorizationAccess Control Models: Controlling Resource Authorization
Access Control Models: Controlling Resource Authorization
Ā 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
Ā 
Attribute based access control
Attribute based access controlAttribute based access control
Attribute based access control
Ā 
Intro To Access Controls
Intro To Access ControlsIntro To Access Controls
Intro To Access Controls
Ā 

Semelhante a Access Controls

information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...Zara Nawaz
Ā 
Chapter 7
Chapter 7Chapter 7
Chapter 7Seth Nurul
Ā 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptshanthishyam
Ā 
boundary_security.pptx
boundary_security.pptxboundary_security.pptx
boundary_security.pptxKelvinDube4
Ā 
Final year presentation
Final year presentationFinal year presentation
Final year presentationAbhishek Jain
Ā 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptxams1ams11
Ā 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control FundamentalsSetiya Nugroho
Ā 
Access C systrm.pptx
Access C systrm.pptxAccess C systrm.pptx
Access C systrm.pptxUgyenWangmo8
Ā 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountabilityLeo Mark Villar
Ā 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAlgoSec
Ā 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access controlLeo Mark Villar
Ā 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk AssessmentsPriyank Hada
Ā 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwaribhanu krishna
Ā 
Cloud bursting methodology
Cloud bursting methodologyCloud bursting methodology
Cloud bursting methodologyJonathan Spindel
Ā 
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Positive Hack Days
Ā 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system securityG Prachi
Ā 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
Ā 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012AVEVA
Ā 

Semelhante a Access Controls (20)

information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...information security(authentication application, Authentication and Access Co...
information security(authentication application, Authentication and Access Co...
Ā 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Ā 
C&NS_FIREWALLS.ppt
C&NS_FIREWALLS.pptC&NS_FIREWALLS.ppt
C&NS_FIREWALLS.ppt
Ā 
boundary_security.pptx
boundary_security.pptxboundary_security.pptx
boundary_security.pptx
Ā 
Final year presentation
Final year presentationFinal year presentation
Final year presentation
Ā 
CH12-CompSec4e.pptx
CH12-CompSec4e.pptxCH12-CompSec4e.pptx
CH12-CompSec4e.pptx
Ā 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
Ā 
Access C systrm.pptx
Access C systrm.pptxAccess C systrm.pptx
Access C systrm.pptx
Ā 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
Ā 
4_5949547032388570388.ppt
4_5949547032388570388.ppt4_5949547032388570388.ppt
4_5949547032388570388.ppt
Ā 
Avoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slidesAvoid outages-from-misconfigured-devices-webinar-slides
Avoid outages-from-misconfigured-devices-webinar-slides
Ā 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
Ā 
Security Baselines and Risk Assessments
Security Baselines and Risk AssessmentsSecurity Baselines and Risk Assessments
Security Baselines and Risk Assessments
Ā 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
Ā 
Authentication
AuthenticationAuthentication
Authentication
Ā 
Cloud bursting methodology
Cloud bursting methodologyCloud bursting methodology
Cloud bursting methodology
Ā 
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Ā 
Least privilege, access control, operating system security
Least privilege, access control, operating system securityLeast privilege, access control, operating system security
Least privilege, access control, operating system security
Ā 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
Ā 
Scada security webinar 2012
Scada security webinar 2012Scada security webinar 2012
Scada security webinar 2012
Ā 

Mais de primeteacher32

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycleprimeteacher32
Ā 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functionsprimeteacher32
Ā 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizeroprimeteacher32
Ā 
Function Parameters
Function ParametersFunction Parameters
Function Parametersprimeteacher32
Ā 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loopsprimeteacher32
Ā 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structuresprimeteacher32
Ā 
Input Validation
Input ValidationInput Validation
Input Validationprimeteacher32
Ā 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systemsprimeteacher32
Ā 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionalsprimeteacher32
Ā 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIOprimeteacher32
Ā 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statementsprimeteacher32
Ā 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Inputprimeteacher32
Ā 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentationsprimeteacher32
Ā 
Block chain security
Block chain securityBlock chain security
Block chain securityprimeteacher32
Ā 

Mais de primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
Ā 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
Ā 
Returning Data
Returning DataReturning Data
Returning Data
Ā 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
Ā 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
Ā 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
Ā 
Nested Loops
Nested LoopsNested Loops
Nested Loops
Ā 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
Ā 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
Ā 
Input Validation
Input ValidationInput Validation
Input Validation
Ā 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
Ā 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
Ā 
Conditionals
ConditionalsConditionals
Conditionals
Ā 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
Ā 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
Ā 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
Ā 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
Ā 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
Ā 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
Ā 
Block chain security
Block chain securityBlock chain security
Block chain security
Ā 

ƚltimo

Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Datingkojalkojal131
Ā 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.GabrielaMiletti
Ā 
Bur Dubai Call Girl Service #$# O56521286O Call Girls In Bur Dubai
Bur Dubai Call Girl Service #$# O56521286O Call Girls In Bur DubaiBur Dubai Call Girl Service #$# O56521286O Call Girls In Bur Dubai
Bur Dubai Call Girl Service #$# O56521286O Call Girls In Bur Dubaiparisharma5056
Ā 
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)Delhi Call girls
Ā 
CALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual serviceCALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
Ā 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja Nehwal
Ā 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfKen Fuller
Ā 
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...robinsonayot
Ā 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Pooja Nehwal
Ā 
Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)
Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)
Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)amitlee9823
Ā 
0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf
0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf
0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdfssuserded2d4
Ā 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...Call Girls in Nagpur High Profile
Ā 
Call Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangaloreamitlee9823
Ā 
Delhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Callshivangimorya083
Ā 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
Ā 
Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..Masuk Ahmed
Ā 
CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service šŸ§³
CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service  šŸ§³CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service  šŸ§³
CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service šŸ§³anilsa9823
Ā 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
Ā 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negronnegronf24
Ā 

ƚltimo (20)

Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen DatingDubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Dubai Call Girls Starlet O525547819 Call Girls Dubai Showen Dating
Ā 
Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...
Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...
Sensual Moments: +91 9999965857 Independent Call Girls Paharganj Delhi {{ Mon...
Ā 
Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.Brand Analysis for reggaeton artist Jahzel.
Brand Analysis for reggaeton artist Jahzel.
Ā 
Bur Dubai Call Girl Service #$# O56521286O Call Girls In Bur Dubai
Bur Dubai Call Girl Service #$# O56521286O Call Girls In Bur DubaiBur Dubai Call Girl Service #$# O56521286O Call Girls In Bur Dubai
Bur Dubai Call Girl Service #$# O56521286O Call Girls In Bur Dubai
Ā 
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)
WhatsApp šŸ“ž 8448380779 āœ…Call Girls In Salarpur Sector 81 ( Noida)
Ā 
CALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual serviceCALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual service
CALL ON āž„8923113531 šŸ”Call Girls Nishatganj Lucknow best sexual service
Ā 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Ā 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
Ā 
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
Ā 
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Ā 
Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)
Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)
Call Girls Bidadi ā˜Ž 7737669865ā˜Ž Book Your One night Stand (Bangalore)
Ā 
0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf
0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf
0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf0425-GDSC-TMU.pdf
Ā 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Ā 
Call Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Ā 
Delhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Ex 9711199171 ā˜Žāœ”šŸ‘Œāœ” Whatsapp Hard And Sexy Vip Call
Ā 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
Ā 
Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..
Ā 
CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service šŸ§³
CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service  šŸ§³CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service  šŸ§³
CALL ON āž„8923113531 šŸ”Call Girls Husainganj Lucknow best Female service šŸ§³
Ā 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Ā 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negron
Ā 

Access Controls

  • 2. INTRODUCTION ā€¢ USERS FIRST MUST BE IDENTIFIED AS AUTHORIZED USER, SUCH AS BY LOGGING IN WITH USER NAME AND PASSWORD TO LAPTOP COMPUTER ā€¢ BECAUSE LAPTOP CONNECTS TO CORPORATE NETWORK THAT CONTAINS CRITICAL DATA, IMPORTANT ALSO TO RESTRICT USER ACCESS TO ONLY SOFTWARE, HARDWARE, AND OTHER RESOURCES FOR WHICH USER HAS BEEN APPROVED ā€¢ THESE TWO ACTSā€”AUTHENTICATING ONLY APPROVED USERS AND CONTROLLING THEIR ACCESS TO RESOURCESā€”ARE IMPORTANT FOUNDATIONS IN INFORMATION SECURITY
  • 3. WHAT IS ACCESS CONTROL? ā€¢ ACCESS CONTROL - GRANTING OR DENYING APPROVAL TO USE SPECIFIC RESOURCES; IT IS CONTROLLING ACCESS ā€¢ PHYSICAL ACCESS CONTROL - FENCING, HARDWARE DOOR LOCKS, AND MANTRAPS THAT LIMIT CONTACT WITH DEVICES ā€¢ TECHNICAL ACCESS CONTROL - TECHNOLOGY RESTRICTIONS THAT LIMIT USERS ON COMPUTERS FROM ACCESSING DATA
  • 4. ACCESS CONTROL TERMINOLOGY ā€¢ IDENTIFICATION - PRESENTING CREDENTIALS (EXAMPLE: DELIVERY DRIVER PRESENTING EMPLOYEE BADGE) ā€¢ AUTHENTICATION - CHECKING CREDENTIALS (EXAMPLE: EXAMINING THE DELIVERY DRIVERā€™S BADGE) ā€¢ AUTHORIZATION - GRANTING PERMISSION TO TAKE ACTION (EXAMPLE: ALLOWING DELIVERY DRIVER TO PICK UP PACKAGE)
  • 6. ACCESS CONTROL MODELS ā€¢ ACCESS CONTROL MODEL - HARDWARE AND SOFTWARE PREDEFINED FRAMEWORK THAT CUSTODIAN CAN USE FOR CONTROLLING ACCESS ā€¢ ACCESS CONTROL MODELS USED BY CUSTODIANS FOR ACCESS CONTROL ARE NEITHER CREATED NOR INSTALLED BY CUSTODIANS OR USERS; INSTEAD, THESE MODELS ARE ALREADY PART OF SOFTWARE AND HARDWARE. ā€¢ ACCESS CONTROL MODELS ā€¢ DAC - LEAST RESTRICTIVE MODEL ā€¢ MAC - OPPOSITE OF DAC AND IS MOST RESTRICTIVE ACCESS CONTROL MODEL ā€¢ UAC - USER/ADMIN LEVEL MODEL THAT NOTIFIES OR REQUIRES AUTHENTICATION PRIOR TO GRANTING ACCESS
  • 7. DISCRETIONARY ACCESS CONTROL (DAC) ā€¢ DISCRETIONARY ACCESS CONTROL (DAC) - LEAST RESTRICTIVE MODEL ā€¢ EVERY OBJECT HAS OWNER, WHO HAS TOTAL CONTROL OVER THAT OBJECT ā€¢ OWNERS CAN CREATE AND ACCESS THEIR OBJECTS FREELY ā€¢ OWNER CAN GIVE PERMISSIONS TO OTHER SUBJECTS OVER THESE OBJECTS ā€¢ DAC USED ON OPERATING SYSTEMS LIKE UNIX AND MICROSOFT WINDOWS ā€¢ DAC HAS TWO SIGNIFICANT WEAKNESSES: ā€¢ DAC RELIES ON DECISIONS BY END-USER TO SET PROPER LEVEL OF SECURITY; INCORRECT PERMISSIONS MIGHT BE GRANTED TO SUBJECT OR PERMISSIONS MIGHT BE GIVEN TO UNAUTHORIZED SUBJECT ā€¢ SUBJECTā€™S PERMISSIONS WILL BE ā€œINHERITEDā€ BY ANY PROGRAMS THAT SUBJECT EXECUTES; ATTACKERS OFTEN TAKE ADVANTAGE OF THIS INHERITANCE BECAUSE END-USERS
  • 8. MANDATORY ACCESS CONTROL (MAC) ā€¢ MANDATORY ACCESS CONTROL (MAC) - OPPOSITE OF DAC AND IS MOST RESTRICTIVE ACCESS CONTROL MODEL ā€¢ MAC ASSIGNS USERSā€™ ACCESS CONTROLS STRICTLY ACCORDING TO CUSTODIANā€™S DESIRES AND USER HAS NO FREEDOM TO SET ANY CONTROLS ā€¢ TWO KEY ELEMENTS TO MAC: ā€¢ LABELS - EVERY ENTITY IS AN OBJECT (LAPTOPS, FILES, PROJECTS, AND SO ON) AND ASSIGNED CLASSIFICATION LABEL (CONFIDENTIAL, SECRET, AND TOP SECRET) WHILE SUBJECTS ASSIGNED PRIVILEGE LABEL (A CLEARANCE) ā€¢ LEVELS - HIERARCHY BASED ON LABELS IS ALSO USED, BOTH FOR OBJECTS AND SUBJECTS (TOP SECRET HIGHER LEVEL THAN SECRET)
  • 9. MANDATORY ACCESS CONTROL (MAC): MAJOR IMPLEMENTATIONS ā€¢ LATTICE MODEL - SUBJECTS AND OBJECTS ARE ASSIGNED ā€œRUNGā€ ON LATTICE AND MULTIPLE LATTICES CAN BE PLACED BESIDE EACH OTHER ā€¢ BELL-LAPADULA - SIMILAR TO LATTICE MODEL BUT SUBJECTS MAY NOT CREATE NEW OBJECT OR PERFORM SPECIFIC FUNCTIONS ON LOWER LEVEL OBJECTS ā€¢ BIBA INTEGRITY MODEL - GOES BEYOND BLP MODEL AND ADDS PROTECTING DATA INTEGRITY AND CONFIDENTIALITY ā€¢ MANDATORY INTEGRITY CONTROL (MIC) - BASED ON BIBA MODEL, MIC ENSURES DATA INTEGRITY BY CONTROLLING ACCESS TO SECURABLE OBJECTS
  • 10. WINDOWS USER ACCOUNT CONTROL (UAC)
  • 11. ROLE BASED ACCESS CONTROL (RBAC) ā€¢ ROLE BASED ACCESS CONTROL (RBAC) - CONSIDERED MORE ā€œREAL-WORLDā€ ACCESS CONTROL THAN OTHER MODELS BECAUSE ACCESS BASED ON USERā€™S JOB FUNCTION WITHIN ORGANIZATION ā€¢ INSTEAD OF SETTING PERMISSIONS FOR EACH USER OR GROUP ASSIGNS PERMISSIONS TO PARTICULAR ROLES IN ORGANIZATION AND THEN ASSIGNS USERS TO THOSE ROLES ā€¢ OBJECTS ARE SET TO BE A CERTAIN TYPE, TO WHICH SUBJECTS WITH THAT PARTICULAR ROLE HAVE ACCESS ā€¢ SUBJECTS MAY HAVE MULTIPLE ROLES ASSIGNED TO THEM
  • 12. RULE BASED ACCESS CONTROL (RBAC) ā€¢ RULE BASED ACCESS CONTROL (RBAC) - DYNAMICALLY ASSIGN ROLES TO SUBJECTS BASED ON SET OF RULES DEFINED BY CUSTODIAN ā€¢ EACH RESOURCE OBJECT CONTAINS SET OF ACCESS PROPERTIES BASED ON RULES ā€¢ WHEN USER ATTEMPTS TO ACCESS THAT RESOURCE, SYSTEM CHECKS RULES CONTAINED IN OBJECT TO DETERMINE IF ACCESS IS PERMISSIBLE
  • 14. BEST PRACTICES FOR ACCESS CONTROL ā€¢ ESTABLISHING BEST PRACTICES FOR LIMITING ACCESS CAN HELP SECURE SYSTEMS AND DATA ā€¢ A FEW BEST PRACTICES: ā€¢ SEPARATION OF DUTIES - NOT TO GIVE ONE PERSON TOTAL CONTROL ā€¢ JOB ROTATION - INDIVIDUALS PERIODICALLY MOVED BETWEEN JOB RESPONSIBILITIES ā€¢ LEAST PRIVILEGE - LIMITING ACCESS TO INFORMATION BASED ON WHAT IS NEEDED TO PERFORM A JOB FUNCTION ā€¢ IMPLICIT DENY - IF CONDITION IS NOT EXPLICITLY MET, ACCESS REQUEST IS REJECTED ā€¢ MANDATORY VACATIONS - LIMITS FRAUD, BECAUSE PERPETRATOR MUST BE PRESENT DAILY TO HIDE FRAUDULENT ACTIONS
  • 15. IMPLEMENTING ACCESS CONTROL ā€¢ NOW THAT WE HAVE DISCUSSED THE MODELS THAT CAN BE IMPLEMENTED IT IS TIME TO EXAMINE THE TECHNOLOGIES USED TO IMPLEMENT ACCESS CONTROL: ā€¢ ACCESS CONTROL LISTS ā€¢ GROUP POLICY ā€¢ ACCOUNT RESTRICTIONS
  • 16. ACCESS CONTROL LISTS (ACLS) ā€¢ ACCESS CONTROL LIST (ACL) - SET OF PERMISSIONS ATTACHED TO AN OBJECT ā€¢ SPECIFIES WHICH SUBJECTS MAY ACCESS THE OBJECT AND WHAT OPERATIONS THEY CAN PERFORM ā€¢ WHEN SUBJECT REQUESTS TO PERFORM AN OPERATION SYSTEM CHECKS ACL FOR AN APPROVED ENTRY ā€¢ ACLS USUALLY VIEWED IN RELATION TO OPERATING SYSTEM FILES ā€¢ EACH ENTRY IN THE ACL TABLE IS CALLED ACCESS CONTROL ENTRY (ACE) ā€¢ ACE STRUCTURE (WINDOWS) ā€¢ SECURITY IDENTIFIER FOR THE USER OR GROUP ACCOUNT OR LOGON SESSION ā€¢ ACCESS MASK THAT SPECIFIES ACCESS RIGHTS CONTROLLED BY ACE ā€¢ FLAG THAT INDICATES TYPE OF ACE
  • 17. ACCESS CONTROL LIST (ACLS): LIMITATIONS ā€¢ ALTHOUGH WIDELY USED, ACLS HAVE LIMITATIONS: ā€¢ USING ACLS IS NOT EFFICIENT - ACL FOR EACH FILE, PROCESS, OR RESOURCE MUST BE CHECKED EVERY TIME THE RESOURCE IS ACCESSED. ā€¢ CAN BE DIFFICULT TO MANAGE IN AN ENTERPRISE SETTING WHERE MANY USERS NEED TO HAVE DIFFERENT LEVELS OF ACCESS TO MANY DIFFERENT RESOURCES; SELECTIVELY ADDING, DELETING, AND CHANGING ACLS ON INDIVIDUAL FILES, OR EVEN GROUPS OF FILES, CAN BE TIME-CONSUMING AND OPEN TO ERRORS, PARTICULARLY IF CHANGES MUST BE MADE FREQUENTLY
  • 18. GROUP POLICIES ā€¢ GROUP POLICY - MICROSOFT WINDOWS FEATURE THAT PROVIDES CENTRALIZED MANAGEMENT AND CONFIGURATION OF COMPUTERS AND REMOTE USERS USING ACTIVE DIRECTORY (AD) ā€¢ USUALLY USED IN ENTERPRISE ENVIRONMENTS ā€¢ SETTINGS STORED IN GROUP POLICY OBJECTS (GPOS) ā€¢ LOCAL GROUP POLICY HAS FEWER OPTIONS THAN A GROUP POLICY AND USED TO CONFIGURE SETTINGS FOR SYSTEMS NOT PART OF AD
  • 19. ACCOUNT RESTRICTIONS TIME OF DAY RESTRICTIONS ā€¢ TIME OF DAY RESTRICTIONS - LIMITS THE TIME OF DAY A USER MAY LOG ONTO A SYSTEM ā€¢ TIME BLOCKS FOR PERMITTED ACCESS ARE CHOSEN ā€¢ CAN BE SET ON INDIVIDUAL SYSTEMS ACCOUNT EXPIRATION RESTRICTIONS ā€¢ ORPHANED ACCOUNTS - ACCOUNTS THAT REMAIN ACTIVE AFTER EMPLOYEE HAS LEFT ORGANIZATION ā€¢ DORMANT ACCOUNTS ā€“ ACCOUNTS NOT ACCESSED FOR LENGTHY PERIOD OF TIME ā€¢ BOTH CAN BE SECURITY RISKS ā€¢ ACCOUNT EXPIRATION - PROCESS OF SETTING A USERā€™S ACCOUNT TO EXPIRE ā€¢ ACCOUNT EXPIRATION CAN BE EXPLICIT (ACCOUNT EXPIRES ON A SET DATE) OR BASED ON SPECIFIC NUMBER OF DAYS OF INACTIVITY

Notas do Editor

  1. Getting into an office space, similar to OOP or visit someone
  2. Object - Specific resource (Example: file or hardware device) Subject - User or process functioning on behalf of a user (Example: computer user) Operation - Action taken by the subject over an object (Example: deleting file) Owner Description: Person responsible for the information Duties: Determines the level of security needed for the data and delegates security duties as required Example: Determines that the file SALARY.XLSX can be read only by department managers Custodian Description: Individual to whom day-to-day actions have been assigned by the owner Duties: Periodically reviews security settings and maintains records of access by end-users Example: Sets and reviews security settings on SALARY.XLSX End-user Description: User who accesses information in the course of routine job responsibilities Duties: Follows organizationā€™s security guidelines and does not attempt to circumvent security Example: Opens SALARY.XLSX
  3. Group or User enroll
  4. BCM Explain difference between this and groups Groups can be depts. But within a group you can have diff roles ie Dept Chairs and Advisors and Lab techs
  5. 2 sports teams part of the same organization and share stadium resources but only have access to their sport specific equipment
  6. Separation of Duties Fraud can result from single user being trusted with complete control of a process Requiring two or more people responsible for functions related to handling money System is not vulnerable to actions of a single person Job Rotation Limits amount of time individuals are in position to manipulate security configurations Helps expose potential avenues for fraud Reduces employee burnout Least Privilege Helps reduce attack surface by eliminating unnecessary privileges Should apply to users and processes on the system Processes should run at minimum security level needed to correctly function Temptation to assign higher levels of privilege is great Challenges of least privilege Legacy applications Explanation: Many older software applications were designed to run only with a high level of privilege. Many of these applications were internally developed and are no longer maintained or are third-party applications that are no longer supported. Redeveloping the application may be seen as too costly. An alternative is to run the application in a virtualized environment. Common administrative tasks Explanation: In some organizations, basic system administration tasks are performed by the user, such as connecting printers or defragmenting a disk. Without a higher level of privilege, users must contact the help desk so that a technician can help with the tasks. Software installation/upgrade Explanation: A software update that is not centrally deployed can require a higher privilege level, which can mean support from the local help desk. This usually results in decreased productivity and increased support costs. Implicit Deny Example: Network router rejects access to all except conditions matching the rule restrictions When creating access control restrictions, recommended that unless condition is specifically met then access should be denied Mandatory Vacations Audit of employeeā€™s activities usually scheduled during vacation for sensitive positions
  7. DAC