SPCL Notess
SPCL Notess
TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE
& ENGINEERING
System and Network Security
Faculty: Ms.Sheetal Laroiya (E15433)
DISCOVER . LEARN .
EMPOWER
Table of content
Access control
Steps in Access control
Terminologies for access control
Principles of Access control
Access Control model
Mandatory Access Control
Discretionary Access Control
Role-Based Access Control
Access Control in Today’s Distributed and Mobile Computing World
COURSE OUTCOME
CO1: Understand the fundamental principles of network security,
including various types of network attacks, attacker methodologies,
and the key challenges faced in network defense.
CO2: Demonstrate proficiency in implementing security strategies
such as Defense-in-Depth and Continual/Adaptive Security to
safeguard systems and networks from potential threats.
CO3: Identify and apply access control principles and models to
secure technical network resources, ensuring authorized access and
protecting against unauthorized intrusions.
Content
Access control
Steps in access control
Terminologies used in access control
Principles access control
Access control model
MAC
DAC
Access Control in Today’s Distributed and Mobile Computing World
Access Control
Steps in Access control
Step 1: A user provides their credentials/identification while logging into the system.
§ Step 2: The system validates the user with the database on the basis of the
provided
credentials/identification such as a password, fingerprint, etc.
§ Step 3: Once the identification is successful, the system provides the user access
to
use the system.
§ Step 4: The system then allows the user to perform only those operations or
access
only those resources for which the user has been authorized.
Terminologies for access control
Access Control Terminologies
Reference Monitor
A reference monitor monitors the restrictions imposed on the basis
of certain access control rules. It implements a set of rules on the
ability of the subject to perform certain actions on the object.
Operation
An operation is an action performed by a subject on an object. A user
trying to delete a file is an
example of an operation. Here, the user is the subject, the action of
deleting refers to the operation, and the file is the object.
Principles of Access control
Access Control model
Mandatory Access Control
For queries
Email:
Sheetal.e15433@cu
mail.in