Information Security 03 - Protection Models
Information Security 03 - Protection Models
Arfan Shahzad
{ [email protected] }
Course Outline
Protection Models
• The goal of the Access Control Model is to ensure that only authorized
individuals or processes are allowed to access specific resources or
perform certain actions within a system.
Protection Models cont…
Access Control Model
• There are several types of Access Control Models, including:
• Access decisions are based on the labels and predefined access rules,
which are typically enforced by the operating system or security
software.
Protection Models cont…
Access Control Model: Mandatory Access Control (MAC)
Protection Models cont…
Access Control Model: Discretionary Access Control (DAC)
• In this model, access control decisions are left to the discretion of the
resource owner.
• It enforces the “no read up, no write down” principle, meaning that a
user or process at a certain security level can only access or modify
information at that level or lower.
Protection Models cont…
Confidentiality Model: Bell-LaPadula Model (BLP)
Protection Models cont…
Confidentiality Model: Biba Model
• The Biba model, also based on multilevel security, focuses on the
integrity of information.
• It enforces the “no write up, no read down” principle, ensuring that
information is not modified or accessed by entities with lower
integrity levels.
Protection Models cont…
Confidentiality Model: Clark-Wilson Model (BLP)
• The Clark-Wilson model is designed to ensure the integrity and
consistency of data.
1. Biba Model
2. Clark-Wilson Model
3. Non-Interference Model
2. Load Balancing
3. Fault Tolerance
Protection Models cont…
Availability Model
4. Disaster Recovery and Business Continuity Planning
1. Perimeter Security
2. Network Security
3. Host-based Security
Protection Models cont…
Defense in Depth Model
4. Application Security
5. Data Security
6. User Security
7. Physical Security
Protection Models cont…
Defense in Depth Model: Perimeter Security
• The outermost layer focuses on securing the network perimeter and
preventing unauthorized access.
• The idea is that if one layer fails or is bypassed, other layers can provide
additional protection, making it more difficult for attackers to penetrate
the entire system.
Protection Models cont…
Least Privilege Model
• The Least Privilege Model, also known as the Principle of Least
Privilege (PoLP), is a security principle and access control model that
restricts user privileges to the minimum level necessary to perform
their assigned tasks.
• This helps prevent conflicts of interest and reduces the risk of insider
threats.
Protection Models cont…
Least Privilege Model: Access Control
• The model emphasizes implementing strong access controls, such as
role-based access control (RBAC) or attribute-based access control
(ABAC), to enforce least privilege.
• These controls ensure that users can only access the resources they
specifically require for their tasks and that access permissions are
regularly reviewed and updated.
Protection Models cont…
Least Privilege Model: Privilege Escalation Mitigation
• The model aims to prevent privilege escalation attacks, where an
attacker gains unauthorized access to higher privilege levels.