KEMBAR78
Saif Is Lecture Access Controls | PDF | Computer Access Control | Databases
0% found this document useful (0 votes)
21 views38 pages

Saif Is Lecture Access Controls

Uploaded by

moizahmad248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views38 pages

Saif Is Lecture Access Controls

Uploaded by

moizahmad248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Information Security

CS-497

Dr. Saif Ur Rehman


Access Control
Contents

 Access Control

 Access Control Implementation

 Components of Access Control

 Access Control List – ACL

 Access Control List Types

 Access Control Policies

 Types of Access Control Policies


Access control
 It is a data security process that enables organizations to manage
who is authorized to access corporate data and resources.

OR

 Access control is a security strategy that controls who or what can


view or utilize resources in a computer system.
Access control
 In its simplest form, access control involves identifying a user based
on their credentials and then authorizing the appropriate level of
access once they are authenticated. Passwords, pins, security
tokens—and even biometric scans—are all credentials commonly
used to identify and authenticate a user.

 It is a fundamental security concept that reduces risk to the company


or organization.

 Secure access control uses policies that verify users are who they
claim to be and ensures appropriate control access levels are granted
to users.
Access Control Implementation
 Implementing access control is a crucial component of web
application security, ensuring only the right users have the right level
of access to the right resources.

 The process is critical to helping organizations avoid data


breaches and fighting attack vectors, such as a buffer overflow
attack, KRACK attack, on-path attack, or phishing attack.
Access Control Implementation
Data Breaches - A data breach is an event that results in confidential, private,
protected, or sensitive information being exposed to a person not authorized to
access it.

attack vectors - Method of achieving unauthorized network access to launch a


cyber attack.

KRACK attack - Key reinstallation attacks (KRACK) are a type of cyberattack


that exploit a vulnerability in WPA2 for the purpose of stealing data transmitted
over networks

Phishing Attacks - refers to an attempt to steal sensitive information, typically


in the form of usernames, passwords, credit card numbers, bank account
information or other important data in order to utilize or sell the stolen
information
Components of Access Control
 Authentication
 Authorization
 Access
 Manage
 Audit
Components of Access Control
 Authentication
– Authentication is the initial process of establishing the
identity of a user.
– For example, when a user signs in to their email
service or online banking account with a username and
password combination, their identity has been
authenticated.
– However, authentication alone is not sufficient to
protect organizations’ data.
Components of Access Control
 Authorization
– Adds an extra layer of security to the authentication process. It
specifies access rights and privileges to resources to determine
whether the user should be granted access to data or make a
specific transaction.
– For example, an email service or online bank account can require
users to provide two-factor authentication (2FA), which is
typically a combination of something they know (such as a
password), something they possess (such as a token), or
something they are (like a biometric verification).
– This information can also be verified through a 2FA mobile app or
a thumbprint scan on a smartphone.
Components of Access Control
 Access
– Once a user has completed the authentication and
authorization steps, their identity will be verified.

– This grants them access to the resource they are attempting to log
in to.
Components of Access Control
 Manage
– Organizations can manage their access control system by adding

and removing the authentication and authorization of their users

and systems.

– Managing these systems can become complex in modern IT

environments that comprise cloud services and on-premises

systems.
Components of Access Control
 Audit
– Organizations can enforce the principle of least
privilege through the access control audit process.

– This enables them to gather data around user activity and analyze
that information to discover potential access violations.
Access Control List - ACL
 It is a list of rules that specifies which users or systems are granted or
denied access to a particular object or system resource.

 Access control lists are also installed in routers or switches, where they
act as filters, managing which traffic can access the network.

 ACLs are also built into network interfaces and operating systems
(OSes), including Linux and Windows.

 ACL is used for various reasons

– Traffic flow control

– Restricted network traffic for better network performance

– A level of security for network access specifying which areas of the


server/network/service can be accessed by a user and which cannot

– Granular monitoring of the traffic exiting and entering the system


Access Control List Types
 File system ACLs

– Manage access to files and directories. They give OSes the


instructions that establish user access permissions for the system
and their privileges once the system has been accessed.

 Networking ACLs

– Manage network access by providing instructions to network


switches and routers that specify the types of traffic that are
allowed to interface with the network. These ACLs also specify
user permissions once inside the network. The network
administrator predefines the networking ACL rules. In this way,
they function similar to a firewall.
Access Control List Types
 Standard ACLs

– Block or allow an entire protocol suite using source IP addresses.

 Extended ACLs

– Block or allow network traffic based on a more differentiated set of


characteristics that includes source and destination IP
addresses and port numbers, as opposed to just source address.
Database Security
 Database is an essential element to any application in use

 Database security refers to the range of tools, controls


and measures designed to establish and preserve
database confidentiality, integrity and availability.
Confidentiality is the element that’s compromised in most
data breaches.
Database Security
 Database is an essential element to any application in use

 Database security refers to the range of tools, controls


and measures designed to establish and preserve
database confidentiality, integrity and availability.
Confidentiality is the element that’s compromised in most
data breaches.
Database Security
 Database security must address and protect the following:
– The data in the database.

– The database management system (DBMS).

– Any associated applications.

– The physical database server or the virtual database server and


the underlying hardware.

– The computing or network infrastructure that is used to access the


database.
Database Security
 Protect Sensitive Data from
– Unauthorized disclosure
– Unauthorized modification
– Denial of service attacks ( To overload a website or network, with the aim of
degrading its performance or even making it completely inaccessible.)

 Security Controls
– Security Policy
– Access control models
– Integrity protection
– Privacy problems
– Fault tolerance and recovery
– Auditing and intrusion detection
Access Control Policies
 Sets of policies, instructions, and restrictions that are in
place which specify who can access your data, when they
can do so, and up to which level.

 These policies need to be implemented accordingly at all


levels of the organization.

 Help define the standards of data security and data


governance for organizations.

 They set up the level of access to sensitive information for


users based on roles, policies, or rules.
Access Control Policies
 Access control policies need to be applied for all people
accessing data in the organization, including data
consumers, data producers, and other data stakeholders.

 These individuals may include your employees, partners,


contractors, or interns.
Purpose of Access Control Policies
 These policies help you ensure that you meet regulatory
compliance requirements.

 They reduce security risks, as they define restrictions


according to a risk assessment of business value and
impact.

 They make it easy to identify potential causes of any


failures or attacks, as the standards are already laid out
and distributed across the organization.
Types of Access Control Policies
 Discretionary Access Control (DAC)

 Mandatory Access Control (MAC)

 Role-Based Access Control (RBAC)


Types of Access Control Policies
 Discretionary Access Control (DAC)
– Flexible policy in which the resource owner decides who can
access it.

– Users can grant or revoke access rights to others.

– While DAC is easy to implement and offers flexibility, it can be


less secure.

– The risk comes from users potentially giving access without


proper oversight.

– DAC is commonly used in environments where ease of use and


flexibility are more important than strict security.
Types of Access Control Policies
 Discretionary Access Control (DAC)
– DAC decentralizes security decisions, allowing administrators and
resource owners to give access to users at specified levels.

– It uses ACLs (access control lists), which define at what level to


give users permission to a particular resource.
Types of Access Control Policies
 Discretionary Access Control (DAC) - Pros
– DAC is simple to use, and as long as users and roles are listed
correctly, it’s easy to access resources.

– Since access control is decentralized, administrators or owners


can easily add or remove permissions. Owners and users
(depending on their privileges) can control access to their data,
which gives them the ability to read, make changes, or delete
files.
Types of Access Control Policies
 Discretionary Access Control (DAC) - Cons
– Because of its simplicity and flexibility, DAC can pose a security
risk to large organizations, businesses handling sensitive data, or
a combination of these.

– Assigning permissions to individual users is a time-consuming


task for large enterprises, and mistakes made by users given
improper permissions can be detrimental when dealing with
important files.
Types of Access Control Policies
 Mandatory Access Control (MAC)

– Strict policy in which a central authority controls access rights.

Administrators decide which users can access specific resources,

and users cannot change these permissions.

– This ensures a high level of security. MAC is often used in

government and military settings where protecting classified

information is critical.

– It prevents unauthorized users from accessing sensitive data.


Types of Access Control Policies
 Mandatory Access Control (MAC) -- Pros
– High-level data protection With MAC, one can be sure that their most
confidential data is well protected and leaves no room for any leakage.

– Centralized Information: Once data is set in a category it cannot be de-


categorized by anyone other than the head administrator. This makes the
whole system centralized and under the control of only one authority.

– Privacy: Data is set manually by an administrator. No one other than admin


can make changes in category or list of users' accesses to any category. It
can be updated only by admin.
Types of Access Control Policies
 Mandatory Access Control (MAC) -- Cons
– Careful Setting-Up Process: MAC must be set up with good care otherwise
it will make working confused, because sometimes a piece of information
needs to be shared among co-workers in the same organization but MAC
restricts anyone to do so.

– Regular Update Required: It requires regular updating when new data is


added or old data is deleted. The administration is required to put some
consideration into the MAC system and ACL list now and then.

– Lack of Flexibility: MAC system is not operationally flexible. It is not an easy


task to initially input all data and create an ACL that won’t create any trouble
later.
Types of Access Control Policies
 Role-Based Access Control (RBAC) - Role-based security
– Mechanism that restricts system access involving setting
permissions and privileges to enable access to authorized users.
– Most large organizations use role-based access control to provide
their employees with varying levels of access based on their roles
and responsibilities.
– This protects sensitive data and ensures employees can only
access information and perform actions they need to do their jobs.
Types of Access Control Policies
 Role-Based Access Control (RBAC) – Working
– User – an individual with a unique identifier (UID) that has system access
– Role – a named job function (indicates the level of authority)
– Permission – equivalent to access rights
– Session – a period of working time during which a user utilizes
permissions of the roles assigned to them
– Object – a system resource that requires permission to access
– Operation –any action in the protected network
Types of Access Control Policies
 Role-Based Access Control (RBAC) - Role-based security
Types of Access Control Policies
 Role-Based Access Control (RBAC) - Role-based security
Types of Access Control Policies
 Role-Based Access Control (RBAC) – Pros
– Increased efficiency: reducing both the amount of work and error
rate not only makes the process of access control much easier but
also increases efficiency within the organisation with no need for
manual modifications, error handling, and individual access
permission requests.

– Transparency: the access permissions are clear and easy to


understand for the users since they are based on their roles and
they know what to expect.

– Security: the perfect balance between ease-of-use and security,


RBAC systems prevent you from giving more permissions than
needed.
Types of Access Control Policies
 Role-Based Access Control (RBAC) – Cons
– Labour-intensive setup: translating an organizational hierarchy into
an access control model requires a lot of work and can be a bit time-
consuming and labour-intensive to set up.

– Temporary permissions: assigning users temporary access


permissions can be easy to forget to revoke later on when compared
to assigning permissions individually.

– Application: it is not the best solution for small companies since it


can be difficult to create and maintain roles, which is why it is used
only when there are a certain number of roles and users. Even in
large companies with several employees and roles, it may be difficult
to set up and you may end up creating 100 different groups.
Self-Study (Further)
 Difference between firewall and access control list?
 Key Components of an Access Control List
 Common Use Cases for Access Control Lists
 How ACLs work
 Advantages of using an access control list
 RBAC vs. ACL

You might also like