0% found this document useful (0 votes)
5 views20 pages

IS Lecture 07 - Access Control

The document outlines key concepts of access control, including definitions of objects, subjects, and the access process. It describes the steps for a subject to access an object, identifies threats to access control, and discusses digital identity and authentication factors. Additionally, it covers various access control models, techniques, and emphasizes the importance of password management.

Uploaded by

gk0563546
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views20 pages

IS Lecture 07 - Access Control

The document outlines key concepts of access control, including definitions of objects, subjects, and the access process. It describes the steps for a subject to access an object, identifies threats to access control, and discusses digital identity and authentication factors. Additionally, it covers various access control models, techniques, and emphasizes the importance of password management.

Uploaded by

gk0563546
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Basic Terminology

• Object
— A passive entity that contains data or functionality
• Subject
— An active entity that requests access to an object or the
data within an object
• Access
— Flow of information between a Subject and an Object
• Access Control
— Security features that control how Subjects
communicate and interact with Objects
— They protect the systems and resources from
unauthorized access

2
Subjects vs. Objects

3
4 steps for a Subject to Access an Object

4
4-Steps for a Subject to Access an Object
• Identification
— Method of ensuring that a Subject is unique and recognized by
the system
— User name, user ID, account number, Certificate, etc.
• Authentication
— Verifying the identification information
— Password, Passphrase, Key, PIN value, biometric etc.
• Authorization
— Using criteria to allow the operations that subjects can carry
out on objects
• Accountability
— Audit logs and monitoring to track subject activities with
objects

5
Threats to Access Control
• Stop Authorized Access of Legitimate User
—Denial of Service (DoS)
• Unauthorized Access by Illegitimate User
—Shoulder Surfing, Tapping, Sniffing
—Spoofing, Intrusion, Replay Attacks
—Password Cracking
—Malicious Software, Buffer Overflows
—Backdoors, Help Desk Frauds
—Theft, Social Engineering, Data Mining
—Emanations, Data Remanence
—And many more

6
Digital Identity
• Traditionally, identity is taken as a user ID
that is mapped to an individual
• A Digital identity may be made up of
attributes, entitlements, and traits
—Attributes (department, role in company,
shift time, clearance, etc.)
—Entitlements (resources available to users,
authoritative rights in the company, etc.)
—Traits (biometric information, height, gender,
etc.)

7
Access Criteria
• Different types of criteria can be used:
—ID
—Role
—Group
—Physical or Logical Location
—Time of Day
—Transaction Type

8
Identification Requirements
• Important guidelines for issuing
identification values to users:
—Each value should be unique, for user
accountability.
—Standard naming scheme should be followed.
—Value should be non-descriptive of the
user’s position or tasks.
—Value should not be shared between users.

9
Authentication Factors
• Three general factors that can be used for
authentication:
• Something a person knows
— authentication by knowledge
— E.g. Password, PIN, Key
• Something a person has
— authentication by ownership
— E.g. Smart Card, ATM Card, USB Dongle, Mobile Phone
• Something a person is
— authentication by characteristic
— E.g. Biometric, Fingerprint, Face recognition

11
Multi-Factor Authentication
• Strong Authentication
—Use more than 1 authentication factors,
preferably 2
—Two-Factor Authentication
– Use at least 2 authentication factors
– E.g. ATM Card + PIN
—Three-Factor Authentication
– Use 3 authentication factors
– E.g. Smart Card + PIN + Biometric

12
Mutual Authentication
• Two communicating entities authenticate
to each other before passing data
• In majority of cases, only client/user
authentication is implemented
—This leads to server/service impersonation
attacks
• Server authentication is as important as
the client authentication

13
Access Control Layers
• Administrative Controls
—Policy and procedures, Personnel controls
—Supervisory structure
—Security-awareness training, Testing
• Physical Controls
—Network segregation, Perimeter security
—Computer controls, Work area separation
—Data backups, Cabling, Control zone
• Technical Controls
—System access, Network architecture & Access
—Encryption and protocols, Auditing
14
Access Control Models
• AC Model dictates how subjects access objects
• Uses AC technologies and security mechanisms

1. DAC (Discretionary Access Control)


— Data owners decide who has access to resources, ACLs
are used to enforce these access decisions.
2. RBAC (Role Based Access Control)
— Access decisions are based on each subject’s role and/or
functional position.
3. MAC (Mandatory Access Control)
— Operating systems enforce the system’s security policy
through the use of security labels.

15
Access Control Techniques
• Access Control List (ACL) Bound to an object
and indicates what subjects can access it and
what operations they can carry

• Capability Table Bound to a subject and


indicates what objects that subject can access
and what operations it can carry out

• Access Control Matrix Table of subjects and


objects that outlines their access relationships

16
Access Control Techniques
• Rule-based Access Restricts subjects’ access
attempts by predefined rules
—Content-based Access Bases access
decisions on the sensitivity of the data, not
solely on subject identity
—Context-based Access Bases access
decisions on the state of the situation, not
solely on identity or content sensitivity

• Restricted Interfaces Limit the user’s


environment within the system, thus limiting
access to objects

17
Access Control List (ACL) Example

ACL is bounded to an Object

18
ACL vs. Capability Table
Subject-1 Operation-1

Operation-2 Object
Subject-2
Operation-3

Subject-3

Operation-1 Object-1

Operation-2
Subject Object-2
Operation-3

CT is bounded to a Subject Object-3

19
Access Control Matrix (Example)

20
Password Management

Your Password is like Your Toothbrush;

You use it daily,


You don’t share it with your friends,
You change it periodically.

21
Questions ???

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy