Access Control Presentation
Access Control Presentation
Content
Access Access
Access Access
Access control control control in
control control Types
Objectives cybersecurity
Access & Control
• Access
What it means: Being able to use or enter
something such as information, systems, or physical
spaces.
Example: If you have access to a room, you can go
inside.
• Control
What it means: The power or authority to manage
regulate, or guide the use of something.
or decide what happens .
Example: Having control over a game means you
decide what happens next.
Access control
• refers to the methods and policies used to restrict access to resources,
ensuring that only authorized users can access specific data or systems.
• How it works:
In DAC, the owner or administrator of the • How it works:
resource determines who can access it. This In MAC, access is granted or restricted based on
means the owner has complete control over rules established by a central authority, often
the system itself. Users cannot alter these
permissions and can grant or revoke access controls. Each resource is given a classification
to anyone, often based on user identities or label (e.g., "Confidential," "Top Secret") and
groups. users are assigned clearances. A user can only
• Example: access a resource if their clearance level
matches the classification.
A file owner may decide which users can
read or modify the file. In operating systems • Example:
like Windows, the file owner can modify the Used in government and military systems,
access control list (ACL) to define where users with a certain security clearance
can access classified information, but lower-
permissions. level employees cannot.
Role-Based Access Control (RBAC) Attribute-Based Access Control (ABAC)
• Example: • Example:
In an organization, a "Manager" role might A user can only access a resource if they
have permissions to view financial reports, are in a specific location, using a
while a "Sales" role can access customer particular device, and it’s during business
data but not financial reports. hours.
Rule-Based Access Control(RUBAC)
• is an access control model that defines
permissions based on a set of rules
predetermined by the system
administrator or the organization.
• Access is granted or denied based on
these predefined rules, which are applied
to users, resources, and operations.
– Decisions are made based on
predefined rules and policies
– (e.g., firewall rules).
Mandatory Access Control (MAC):
Discretionary Access Control (DAC):
1. File sharing among colleagues.
1. database access by clearance level.
2. Email attachment access control.
2. Access to critical infrastructure
3. Personal folder sharing. systems.
4. Shared network drive access. 3. Access to sensitive security logs.
5. Social media post privacy settings.
6. File Transfer Protocol (FTP) access 4. Vulnerability management system
permissions. access.
7. Document sharing in collaborative 5. Access to penetration testing results.
projects.
Role-Based Access Control (RBAC): Attribute-Based Access Control (ABAC):