Cybersecurity 3 Feb
Cybersecurity 3 Feb
Security
Dr. Uddipana
Dowerah
ABAC Algorithm Steps
Input: User request R, ABAC Policy P abac , User attributes U , Resource attributes Res.
Output: Access granted or denied.
1Step 1: Extract attributes: {U.role, U.dept, U.security level, . . .} and {Res.type, Res.sensitivity
level, . . .}.
2Step 2: Match user attributes against policy:
• Prevent unauthorized users from accessing sensitive data. It also helps limit
the spread of malware
• Once the network has been subdivided into smaller more manageable units,
controls are applied to the individual, compartmentalized segments
Network Segmentation: Benefits
• Network segmentation provides unique security services per network segment,
delivering more control over network traffic and optimizing network performance.
• It provides better security by splitting a large network into smaller subnets thereby
reducing the attack surface. Thus, if the network perimeter is breached, network
segments prevent attackers from moving laterally throughout the network.
• NAC ensures that only users who are authenticated and devices that are
authorized and compliant with security policies can enter the network.
• NAC can be used to segment the network based on user identity, device
type, or other criteria.
• The more a given user has access to, the greater the negative impact if
their account is compromised or if they become an insider threat.
• Organizations that follow the principle of least privilege can improve their
security posture by significantly reducing their attack surface and risk of
malware spread.
Least Privilege Principle: Benefits
• Minimizes the attack surface, diminishing avenues a malicious actor can use to
access sensitive data or carry out an attack by protecting superuser and
administrator privileges.
• Safeguards against human error that can happen through mistake, malice or
negligence.
Malware: Detection and Prevention Algorithms
• The firewall looks for information in the IP, TCP, or UDP headers and then
decides whether to allow or block the packet based on the ACL.
Example 1
Suppose we want to allow inbound mail (SMTP, port 25) but only
to our gateway machine. Also suppose that mail from some
particular site SPIGOT is to be blocked
Packet Filtering Firewall
Example 2
This packet filtering rule allows any host inside the network
(internal) to send email (SMTP) to an external SMTP server.
• The firewall rule does not differentiate between legitimate SMTP traffic and
potential misuse.