KEMBAR78
Access Control in internet and computer science.pptx
ACCESS CONTROL
OUTLINE
-:
 What is Access control
 security principle of control access.
 Access control models
 Types of Access Controls
 Access Control Techniques
 Threats to Access Control
 Categories of Access Controls
 Summary
 References
What is Access control
 Access Controls: The security features that control how users and
systems communicate and interact with one another.
 Access control is the heart of Information Security!
 Access: The flow of information between subject and object
 Subject: An active entity that requests access to an object or the data
in an object
 Object: A passive entity that contains information
reference
monitor
object
source
(e.g. users,
processes)
request guard
resource
(e.g. files,
printers)
access
request
subject
Security principle of control access
protect from un-authorized access
 Method of establishing the subject’s identity
–User, Program, Process
‫ــ‬Use of username or other public information
 Identification component requirements…
–Each value should be unique
–Follow a standard naming scheme
–Non-descriptive of the user’s position or
tasks
–Must not be shared between users
Identification
Authentication
 Method of proving the identity
 How to prove an identity
‫ــ‬Use of passwords, token, or biometrics
other private information
–Strong authentication is important
Authorization
 Determines that the proven identity has
some set of characteristics associated
with it that gives it the right to access the
requested resources
 Audit log and monitoring to track subject
activities with objects.
 Goal is to protect from un-authorized
access
Accountability
Access control models
 Discretionary Access Control (DAC)
 Mandatory Access Control (MAC)
 Non-Discretionary (Role Based) Access
Control Models (RBAC)
 OTHER…
 Discretionary Access Control (DAC)
◦ A system that uses discretionary access control allows
the owner of the resource to specify which subjects
can access which resources.
◦ Access control is at the discretion of the owner.
 Mandatory Access Control (MAC)
◦ Access control is based on a security labeling system.
Users have security clearances and resources have
security labels that contain data classifications.
◦ This model is used in environments where
information classification and confidentiality is very
important (e.g., the military).
 Non-Discretionary (Role Based) Access
Control Models
◦ Role Based Access Control (RBAC) uses a
centrally administered set of controls to
determine how subjects and objects interact.
◦ Is the best system for an organization that has
high turnover.
Traditional Access Control Models
 Easy to implement
 Highly flexible
 Most secure
 Easy to scale
 Scalable
 Flexible – user & permission
 are loosely coupled
 Less administration required
 Doesn't scale well
 ACL explosion possibility
 Prone to mistakes
 Not flexible
 Limited user Functionality
 High admin overhead
 Roles needs provisioning and
 maintenance
 Possibility of role explosion
 Unable to accommodate
realtime
 context
Advantage Disadvantage
DAC
MAC
RBAC
Types of Access Controls
 There are three types of Access Controls:
 Administrative controls
Define roles, responsibilities, policies, and
administrative functions to manage the control
environment.
 Technical controls
Use hardware and software technology to
implement access control.
 Physical controls
Ensure safety and security of the physical
environment
Administrative Controls
•Ensure that technical and physical controls
are understood and properly
implemented
–Policies and procedures
–Security awareness training
–Asset classification and control
–Account administration
–Account, log monitoring
Technical Controls
•Examples ofTechnical Controls are:
–Encryption
–Smart cards
–Access control lists
–Violation reports
–Network monitoring and intrusion
detection
Physical Controls
•Examples of Physical Controls are:
–Fences, locked doors, and restricted areas
–Guards
–Motion detectors
–Video cameras
–Fire detectors
Access Control Techniques
◦ Constrained User Interfaces
◦ Access Control Matrix
◦ Content Dependent Access Control
◦ Context Dependent Access Control
Access Control Techniques
 Constrained User Interfaces
◦ Restrict user’s access abilities by not allowing them
certain types of access, or the ability to request
certain functions or information
 Access Control Matrix
◦ Is a table of subjects and objects indicating what
actions individual subjects can take upon individual
objects.
Access Control Techniques
 Content Dependent Access Control
◦ Access to an object is determined by the content
within the object.
 Context Dependent Access Control
◦ Makes access decision based on the context of a
collection of information rather than content within
an object.
Threats to Access Control
 A few threats to access control
◦ Insiders
 Countermeasures include good policies and procedures,
separation of duties, job rotation
◦ Dictionary Attacks
 Countermeasures include strong password policies, strong
authentication, intrusion detection and prevention
◦ Brute Force Attacks
 Countermeasures include penetration testing, minimum
necessary information provided, monitoring, intrusion
detection, clipping levels
◦ Spoofing at Logon
 Countermeasures include a guaranteed trusted path,
security awareness to be aware of phishing scams, SSL
connection
Categories of Access Controls
Summary
 What is Access control
- Access Controls
- Access
- Subject
-object
 security principle of control access.
- Identification
- authentication
- Authorization
- Accountability
 Access control models
-Discretionary Access Control(DAC)
-Mandatory Access Control (MAC)
-Non-Discretionary (Role Based)
Access Control Models(RBAC)
 Types of Access Controls
-Administrative controls
-Technical controls
-Physical controls
 Access ControlTechniques
-Constrained User Interfaces
-Access Control Matrix
-Content Dependent Access Control
-Context Dependent Access Control.
 Threats to Access Control
-
Insiders
-
Dictionary Attacks
-
Brute Force Attacks
-
Spoofing at Logon
.
◦ Categories of Access Controls
References
 ”Xin Jin”,”Ram Krishnan”, ”Ravi Sandhu”,” A Unified
Attribute-Based Access Control Model Covering DAC,
MAC and RBAC”,”2012”.
 “D.R. Kuhn”,“E.J. Coyne”,” T.R.Weil”,” Adding
Attributes to Role Based Access Control”,“IEEE
Computer,” “2010”).
 “Park, J., Nguyen”,“ Sandhu”,“R.A provenance-based
access control model”.“Privacy, Security and Trust
(PST)” “2012” .
 “william stallings “,“lawrie brown”,” computer security
principles and practice”,” ACM/IEEE Computer
Science Curricula”,“2013”.

Access Control in internet and computer science.pptx

  • 1.
  • 2.
    OUTLINE -:  What isAccess control  security principle of control access.  Access control models  Types of Access Controls  Access Control Techniques  Threats to Access Control  Categories of Access Controls  Summary  References
  • 3.
    What is Accesscontrol  Access Controls: The security features that control how users and systems communicate and interact with one another.  Access control is the heart of Information Security!  Access: The flow of information between subject and object  Subject: An active entity that requests access to an object or the data in an object  Object: A passive entity that contains information reference monitor object source (e.g. users, processes) request guard resource (e.g. files, printers) access request subject
  • 4.
    Security principle ofcontrol access protect from un-authorized access
  • 5.
     Method ofestablishing the subject’s identity –User, Program, Process ‫ــ‬Use of username or other public information  Identification component requirements… –Each value should be unique –Follow a standard naming scheme –Non-descriptive of the user’s position or tasks –Must not be shared between users Identification
  • 6.
    Authentication  Method ofproving the identity  How to prove an identity ‫ــ‬Use of passwords, token, or biometrics other private information –Strong authentication is important
  • 7.
    Authorization  Determines thatthe proven identity has some set of characteristics associated with it that gives it the right to access the requested resources  Audit log and monitoring to track subject activities with objects.  Goal is to protect from un-authorized access Accountability
  • 8.
    Access control models Discretionary Access Control (DAC)  Mandatory Access Control (MAC)  Non-Discretionary (Role Based) Access Control Models (RBAC)  OTHER…
  • 9.
     Discretionary AccessControl (DAC) ◦ A system that uses discretionary access control allows the owner of the resource to specify which subjects can access which resources. ◦ Access control is at the discretion of the owner.
  • 10.
     Mandatory AccessControl (MAC) ◦ Access control is based on a security labeling system. Users have security clearances and resources have security labels that contain data classifications. ◦ This model is used in environments where information classification and confidentiality is very important (e.g., the military).
  • 11.
     Non-Discretionary (RoleBased) Access Control Models ◦ Role Based Access Control (RBAC) uses a centrally administered set of controls to determine how subjects and objects interact. ◦ Is the best system for an organization that has high turnover.
  • 12.
    Traditional Access ControlModels  Easy to implement  Highly flexible  Most secure  Easy to scale  Scalable  Flexible – user & permission  are loosely coupled  Less administration required  Doesn't scale well  ACL explosion possibility  Prone to mistakes  Not flexible  Limited user Functionality  High admin overhead  Roles needs provisioning and  maintenance  Possibility of role explosion  Unable to accommodate realtime  context Advantage Disadvantage DAC MAC RBAC
  • 13.
    Types of AccessControls  There are three types of Access Controls:  Administrative controls Define roles, responsibilities, policies, and administrative functions to manage the control environment.  Technical controls Use hardware and software technology to implement access control.  Physical controls Ensure safety and security of the physical environment
  • 14.
    Administrative Controls •Ensure thattechnical and physical controls are understood and properly implemented –Policies and procedures –Security awareness training –Asset classification and control –Account administration –Account, log monitoring
  • 15.
    Technical Controls •Examples ofTechnicalControls are: –Encryption –Smart cards –Access control lists –Violation reports –Network monitoring and intrusion detection
  • 16.
    Physical Controls •Examples ofPhysical Controls are: –Fences, locked doors, and restricted areas –Guards –Motion detectors –Video cameras –Fire detectors
  • 17.
    Access Control Techniques ◦Constrained User Interfaces ◦ Access Control Matrix ◦ Content Dependent Access Control ◦ Context Dependent Access Control
  • 18.
    Access Control Techniques Constrained User Interfaces ◦ Restrict user’s access abilities by not allowing them certain types of access, or the ability to request certain functions or information  Access Control Matrix ◦ Is a table of subjects and objects indicating what actions individual subjects can take upon individual objects.
  • 19.
    Access Control Techniques Content Dependent Access Control ◦ Access to an object is determined by the content within the object.  Context Dependent Access Control ◦ Makes access decision based on the context of a collection of information rather than content within an object.
  • 20.
    Threats to AccessControl  A few threats to access control ◦ Insiders  Countermeasures include good policies and procedures, separation of duties, job rotation ◦ Dictionary Attacks  Countermeasures include strong password policies, strong authentication, intrusion detection and prevention ◦ Brute Force Attacks  Countermeasures include penetration testing, minimum necessary information provided, monitoring, intrusion detection, clipping levels ◦ Spoofing at Logon  Countermeasures include a guaranteed trusted path, security awareness to be aware of phishing scams, SSL connection
  • 21.
  • 22.
    Summary  What isAccess control - Access Controls - Access - Subject -object  security principle of control access. - Identification - authentication - Authorization - Accountability  Access control models -Discretionary Access Control(DAC) -Mandatory Access Control (MAC) -Non-Discretionary (Role Based) Access Control Models(RBAC)  Types of Access Controls -Administrative controls -Technical controls -Physical controls  Access ControlTechniques -Constrained User Interfaces -Access Control Matrix -Content Dependent Access Control -Context Dependent Access Control.  Threats to Access Control - Insiders - Dictionary Attacks - Brute Force Attacks - Spoofing at Logon . ◦ Categories of Access Controls
  • 23.
    References  ”Xin Jin”,”RamKrishnan”, ”Ravi Sandhu”,” A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC”,”2012”.  “D.R. Kuhn”,“E.J. Coyne”,” T.R.Weil”,” Adding Attributes to Role Based Access Control”,“IEEE Computer,” “2010”).  “Park, J., Nguyen”,“ Sandhu”,“R.A provenance-based access control model”.“Privacy, Security and Trust (PST)” “2012” .  “william stallings “,“lawrie brown”,” computer security principles and practice”,” ACM/IEEE Computer Science Curricula”,“2013”.

Editor's Notes

  • #12 DEFINITION access control list (ACL) An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.