Cybersecurity Unit 5
Cybersecurity Unit 5
Authentication Authorization
It is done before the authorization While this process is done after the
process. authentication process.
It needs usually the user’s login While it needs the user’s privilege or
details. security levels.
Access control:
Access control identifies users by verifying various login credentials, which can
include usernames and passwords, PINs, biometric scans, and security tokens.
Many access control systems also include multifactor authentication (MFA), a
method that requires multiple authentication methods to verify a user’s identity.
Once a user is authenticated, access control then authorizes the appropriate level of
access and allowed actions associated with that user’s credentials and IP address.
There are four main types of access control. Organizations typically choose the
method that makes the most sense based on their unique security and compliance
requirements. The four access control models are:
1. Discretionary access control (DAC): In this method, the owner or
administrator of the protected system, data, or resource sets the
policies for who is allowed access.
2. Mandatory access control (MAC): In this nondiscretionary model,
people are granted access based on an information clearance. A
central authority regulates access rights based on different security
levels. This model is common in government and military
environments.
3. Role-based access control (RBAC): RBAC grants access based on
defined business functions rather than the individual user’s identity.
The goal is to provide users with access only to data that’s been
deemed necessary for their roles within the organization. This widely
used method is based on a complex combination of role
assignments, authorizations, and permissions.
4. Attribute-based access control (ABAC): In this dynamic method,
access is based on a set of attributes and environmental conditions,
such as time of day and location, assigned to both users and
resources.
Q2 What is Modern access management?
IAM users can be sorted into roles, top-level categories of user access to a
particular system or app.
Capturing your identity and access requirements is not an easy task, but it’s
an essential piece of the puzzle. Once complete, you can undertake a
competitive analysis of the leading solution providers.
However, the hurdles don’t end when an IAM vendor is chosen. The
strategy must include how you will handle replacing any previous IAM
solutions. Finding the right balance between security and user-friendliness
is key, but is often the most difficult IAM challenge.
Benefits of IAM
Outside of the numerous security benefits that a robust IAM solution
provides, you can expect several other perks:
Web Access Management tools typically verify a user’s identity by asking for
a username and a password. However, other methods may use access
tokens to generate a one-time password or digital certificate.
Once the user’s identity has been confirmed, they can request access to a
particular web resource subject to policy-based authorization applied to
that user. The system matches the user authorization level to the policy of
the requested resource to grant or deny access. Policies take the form of
rules that specify who can access a specific information resource. For
example, is the user an administrator with wider access or a general user
(employee) with more limited access?
Legacy web access management vs. modern access management
WAM technologies have not always kept up with these changes and
challenges as newer identity access management solutions have come to
the forefront. As such, legacy WAM systems can be costly to maintain while
posing security vulnerabilities from incompatibility with newer
authentication methods.
Q4 Explain the principles of Authorization, grant Authorizations?
Authorization:
Authorization is the process of giving someone permission to do or have
something. In multi-user computer systems, a system administrator
defines for the system which users are allowed access to the system
and what privileges of use (such as access to which file directories,
hours of access, amount of allocated storage space, and so forth).
Assuming that someone has logged in to a computer operating
system or application, the system or application may want to identify
what resources the user can be given during this session. Thus,
authorization is sometimes seen as both the preliminary setting up of
permissions by a system administrator and the actual checking of the
permission values that have been set up when a user is getting access.
There are a few different methods of authorization: API keys, Basic Auth,
HMAC, and OAuth. Each method has its own strengths and weaknesses.
API keys- They are a simple way to authorize access to an API. The key is
passed as part of the request, and the server checks it against a list of
authorized keys. This is a very simple system, but it can be easily abused if
the key falls into the wrong hands.
Basic Auth- This is a simple authentication method that uses usernames and
passwords. The username and password are sent as part of the request,
and the server checks them against a list of authorized users. This is a very
simple system, but it can be easily abused if the username and password
fall into the wrong hands.
There are many different authorization methods, but the four mentioned
above are the most common. Each method has its own strengths and
weaknesses, so it's important to choose the right one for your application.