Lecture06 Access Control Part1
Lecture06 Access Control Part1
CYB281
Chapter 3
Access control (Part1)
Lecture 06
Department of Information Systems
College of Computer Science and Engineering
Taibah University, Yanbu
Course Coordinator: Prof. Fatemah Alharbi
Instructor: Prof. Fatemah Alharbi
Objectives
• Explain how access control fits into the broader context that includes
authentication, authorization, and audit.
• Define the four major categories of access control policies.
• Distinguish among subjects, objects, and access rights.
a
m
• Authentication
• Authorization
• Audit
Verification that the
2 N credentials of a user or
an entity are valid.
An independent review
and examination of
system records and
activities
system's
4/17 Cybersecurity Fundamentals CYB281– Lecture06
Access Control Policies (1/2)
• Dictates:
• What types of access are permitted?
• under what circumstances?
• by whom?
z.wbs.WMAC.sm AC
to be regulated at the level of individual records in files, and individual fields within records. The system should also support fine-
grained specification in the sense of controlling each individual access by a user rather than a sequence of access requests.
3. Least privilege: This is the principle that access control should be implemented so that each system entity is granted the
K. smm
minimum system resources and authorizations that the entity needs to do its work.
4. Separationv5of duty: This is the practice of dividing the steps in a system function among different individuals, so as to keep a
single individual from subverting the process.
5. Open and closed policies: The most useful, and most typical, class of access control policies are closed policies. In a closed policy,
only accesses that are specifically authorized are allowed. In some applications, it may also be desirable to allow an open policy for
some classes of resources. In an open policy, authorizations specify which accesses are prohibited; all other accesses are allowed.
imti.tk
6. Policy combinations and conflict resolution: An access control mechanism may apply multiple policies to a given class of
resources. In this case, care must be taken that there are no conflicts such that one policy enables a particular access while
another policy denies it. Or, if such a conflict exists, a procedure must be defined for conflict resolution.
7. Administrative policies: As was mentioned, there is a security administration function for specifying the authorization database
that acts as an input to the access control function. Administrative policies are needed to specify who can add, delete, or modify
authorization rules. In turn, access control and other control mechanisms are needed to enforce the administrative policies.
8. Dual control: When a task requires two or more individuals working in tandem.
asset
object •entity used to contain and/or receive
resource to information
which access is •protection depends on the environment
controlled in which access control operates
access right:
the way in •e.g., read, write, execute,
which a subject delete, create, search
may access an
object
memory
I
14/17 Cybersecurity Fundamentals CYB281– Lecture06
Access Control Function
• It suggests that every access by a
subject to an object is mediated by the
controller for that object, and that the
controller’s decision is based on the
current contents of the matrix.
• In addition, certain subjects have the
authority to make specific changes to
the access matrix. A request to modify
the access matrix is treated as an
access to the matrix, with the
individual entries in the matrix treated
as objects. Such accesses are mediated
by an access matrix controller, which
controls updates to the matrix.