SEatwork 1
SEatwork 1
Least privilege -limiting access to information based on what is needed to perform a job
function
Implicit deny -if condition is not explicitly met, access request is rejected
Mandatory vacations -limits fraud, because perpetrator must be present daily to hide
fraudulent actions
Users first must be identified as authorized user, such as by logging in with user name
and password to laptop computer.
Because laptop connects to corporate network that contains critical data, important also to
restrict user access to only software, hardware, and other resources for which user has
been approved.
These two acts—authenticating only approved users and controlling their access to
resources—are important foundations in information security
DAC relies on decisions by end-user to set proper level of security; incorrect permissions
might be granted to subject or permissions might be given to unauthorized subject.
Subject’s permissions will be “inherited” by any programs that subject executes;
attackers often take advantage of this inheritance because end-users
Role Based Access Control (RBAC) -considered more “real-world” access control than
other models because access based on user’s job function within organization
Instead of setting permissions for each user or group assigns permissions to particular
roles in organization and then assigns users to those roles
Objects are set to be a certain type, to which subjects with that particular role have access
Subjects may have multiple roles assigned to them
Rule Based Access Control (RBAC) -dynamically assign roles to subjects based on set of
rules defined by custodian
Each resource object contains set of access properties based on rules
When user attempts to access that resource, system checks rules contained in object to
determine if access is permissible
10. What are the technologies used to Implementing Access Control? ( 5pts)
Now that we have discussed the models that can be implemented it is time to examine the
technologies used to implement access control:
Access control lists
Group policy
Account restrictions