1. Trang chủ
  2. » Cao đẳng - Đại học

Slide an toàn và hệ thống bảo mật thông tin chapter 8 access control

18 9 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

.c om cu u du o ng th an co ng ACCESS CONTROL CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Contents What is Access Control ? 2) Four parts of access control 3) Types of access control 4) Formal Models of Access Control cu u du o ng th an co ng 1) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om What is Access Control ?  Access control are methods used to restrict and allow access to certain co ng items, such as automobiles, homes, computers, and even your smartphone th an  Access control is the process of protecting a resource so that it is used cu u du o ng only by those allowed to use it CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Four-Part Access Control  Identification: Who is asking to access the asset? co ng  Authentication: Can the requestor’s identity be verified? th an  Authorization: What, exactly, can the requestor access? And what can du o ng they do? u  Accountability: How can actions be traced to an individual? We need to cu ensure that a person who accesses or makes changes to data or systems can be identified CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Authorization Policies  The first step to controlling access is to create a policy that defines co ng authorization rules th an  Authorization is the process of deciding who has access to which ng computer and network resources: du o  Authorization policy is based on job roles cu u  Authorization policy is based on each individual user CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Methods and Guidelines for Identification  Identification Methods: username, smart card, Biometric (fingerprints, co ng face, voice, …) th an  Identification Guidelines: To ensure that all actions carried out in a cu u du o have a unique identifier ng computer system can be associated with a specific user, each user must CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Processes and Requirements for Authentication  Authentication Types: There are five types of authentication co ng  Knowledge: Something you know, such as a password, passphrase, or an personal identification number (PIN) ng th  Ownership: Something you have, such as a smart card, key, badge, or token du o  Characteristics: Some attribute that is unique to you, such as your cu u fingerprints, retina, or signature CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Processes and Requirements for Authentication  Authentication Types: co ng  Location: Somewhere you are, such as your physical location when you an attempt to access a resource du o u cu keyboard ng th  Action: Something you or how you it, such as the way you type on a CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Policies and Procedures for Accountability  Accountability is tracing an action to a person or process to know who co ng made the changes to the system or data th an  Log Files cu u du o ng  Monitoring and Reviews CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Four-Part Access Control These four parts are divided into two phases: co ng  The policy definition phase: This phase determines who has access and what an systems or resources they can use The authorization definition process operates th in this phase du o ng  The policy enforcement phase: This phase grants or rejects requests for access u based on the authorizations defined in the first phase The identification, cu authentication, authorization execution, and accountability processes operate in this phase CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Types of Access Controls  Physical access controls: These control access to physical resources co ng They could include buildings, parking lots, and protected areas th an  Logical access controls: These control access to a computer system or ng network Your company probably requires that you enter a unique cu u du o username and password to log on to your company computer CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om Formal Models of Access Control ng  Discretionary access control (DAC) co  Mandatory access control (MAC) th cu u du o ng  Rule-based access control an  Role-Based Access Control CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om a Discretionary Access Control (DAC)  Means of restricting access to objects based on the identity of subjects co ng and/or groups to which they belong The controls are discretionary in the an sense that a subject with certain access permission is capable of passing ng th that permission (perhaps indirectly) on to any other subject u cu the users du o  In a DAC model, access is restricted based on the authorization granted to CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om a Discretionary Access Control (DAC)  In a DAC environment, the authorization system uses permission levels to co ng determine what objects any subject can access Permission levels can be th an any of the following: ng  User-based  Task-based u cu  Project-based du o  Job-based, group-based, or role-based access control (RBAC) CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om b Mandatory Access Control  In a mandatory access control (MAC) model, users not have the co ng discretion of determining who can access objects as in a DAC model th an  Security labels are attached to all objects; thus, every file, directory, and cu u du o ng device has its own security label with its classification information CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om c Role-Based Access Control  A role-based access control (RBAC) model uses a centrally administrated co ng set of controls to determine how subjects and objects interact du o ng holds within the company th an  This type of model lets access to resources be based on the role the user cu turnover u  An RBAC model is the best system for a company that has high employee CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om d Rule-Based Access Control  Rule-based access control uses specific rules that indicate what can and co ng cannot happen between a subject and an object th an  “If the user’s ID matches the unique user ID value in the provided digital cu u du o ng certificate, then the user can gain access.” CuuDuongThanCong.com https://fb.com/tailieudientucntt .c om ng co an th ng du o u cu CuuDuongThanCong.com https://fb.com/tailieudientucntt ... Models of Access Control ng  Discretionary access control (DAC) co  Mandatory access control (MAC) th cu u du o ng  Rule-based access control an  Role-Based Access Control CuuDuongThanCong.com... What is Access Control ?  Access control are methods used to restrict and allow access to certain co ng items, such as automobiles, homes, computers, and even your smartphone th an  Access control. .. Types of Access Controls  Physical access controls: These control access to physical resources co ng They could include buildings, parking lots, and protected areas th an  Logical access controls:

Ngày đăng: 18/09/2021, 15:53

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w