Nis Unit 5 Notes
Nis Unit 5 Notes
ACCESS CONTROL
User Identity and Access Management
Access control is the method by which systems determine whether and how to admit a
user into a trusted area of the organization—that is, information systems, restricted areas
such as computer rooms, and the entire physical location. Access control is achieved
through a combination of policies, programs, and technologies. To understand access
controls, you must first understand they are focused on the permissions or privileges that
a subject (user or system) has on an object (resource), including if a subject may access
an object and how the subject may use that object.
Role based controls are associated with the duties a user performs in an organization,
such as a position or temporary assignment like project manager, while task-based
controls are tied to a particular chore or responsibility, such as a department’s printer
administrator. These controls make it easier to maintain the restrictions associated with a
particular role or task, especially if different people perform the role or task. Instead of
constantly assigning and revoking the privileges of employees who come and go, the
administrator simply assigns access rights to the role or task. Then, when users are
associated with that role or task, they automatically receive the corresponding access.
When their turns are over, they are removed from the role or task and access is revoked.
Roles tend to last for a longer term and be related to a position, whereas tasks are much
more granular and short-term. In some organizations the terms are used synonymously.
In general, all access control approaches rely on the following four mechanisms, which
represent the four fundamental functions of access control systems:
1. Identification: I am a user of the system.
2. Authentication: I can prove I’m a user of the system.
3. Authorization: Here’s what I can do with the system.
4. Accountability: You can verify my use of the system
Knowledge factor (Something you know): This factor of authentication relies on what
the user knows and can recall—for example, a password, passphrase, or other unique
authentication code, such as a personal identification number (PIN).
Possession factor (Something you has): This authentication factor relies on something a
user has and can produce when necessary. One example is dumb cards, such as ID cards
or ATM cards with magnetic stripes that contain the digital (and often encrypted) user
PIN, which is compared against the number the user enters. Another common device is
the token—a card or key fob with a computer chip and a liquid crystal display that shows
a computer-generated number used to support remote login authentication.
Inherence factor (Something you are): This authentication factor relies on individual
characteristics, such as fingerprints, palm prints, hand topography, hand geometry, or
retina and iris scans, or something a user can produce on demand. Some of these
characteristics are known collectively as biometrics.
3. Authorization: Authorization is the matching of an authenticated entity to a list of
information assets and corresponding access levels.
Account Authorization
Network access control (NAC) is an umbrella term for managing access to a network.
NAC authenticates users logging into the network and determines what data they can
access and actions they can perform. NAC also examines the health of the user’s
computer or mobile device (the endpoints).