IAS (Notes)
IAS (Notes)
Access Controls - method by which systems determine whether and how to admit a
user into a trusted area of the organization that is, information systems, restricted areas
such as computer rooms, and the entire physical location.
Got it—no emojis. Here's the same content in a clean, professional, and structured
format for fast review and memorization:
● Types include:
Identification
● Unique identification of users in a system.
Authentication
● Verifies the identity of a user.
Authorization
● Determines access privileges after authentication.
Accountability
● Ensures actions can be traced to users.
Biometrics
● Uses physical or behavioral traits for authentication.
● Effectiveness metrics:
● Emphasizes confidentiality.
ITSEC
● European standard.
● Components:
Security Models
Bell-LaPadula (Confidentiality)
● No Read Up (NRU), No Write Down (NWD)
Biba (Integrity)
● No Read Down (NRD), No Write Up (NWU)
Graham-Denning Model
● Defines 8 primitive operations for managing access rights.
Harrison-Ruzzo-Ullman Model
● Builds on Graham-Denning to determine the safety of access rights changes.
● Key principles:
o Assume breach.
Firewall Fundamentals
What is a Firewall?
● A system that controls access between networks.
IP Packet Structure
● Header: contains routing and control information.
o Types:
Firewall Architectures
Single Bastion Host
● One firewall protecting the internal network.
Screened Host
● Packet-filtering router + a bastion host.
● Creates a buffer zone (DMZ) between the internet and internal network.
● Function: Acts as a buffer zone between internal network and the internet.
● Security: Provides limited and controlled access to internal systems.
2. Staff Expertise: Consider the learning curve and training requirements.
3. Scalability: Ensure the firewall can grow with the organization.
● Secure email systems using SMTP gateways with antivirus and anti-spam.
● Block ICMP (e.g., ping) from outside to avoid reconnaissance.
● Block Telnet, especially for public-facing servers.
● Inspection Criteria:
o Port numbers
● Types:
● Modes:
● Impact of COVID-19: Increased demand for secure and scalable remote access
solutions.
● How It Works:
1. Remote user connects to a NAS (Network Access Server) and submits
credentials.
2. Diameter Protocol
● Improved version of RADIUS
● Features:
● Versions:
o Original TACACS
o Extended TACACS
o TACACS+
● Key Features:
o Separates authentication, authorization, and accounting.
4. Kerberos
● Concept: Named after the three-headed dog from mythology.
● Uses: Symmetric-key encryption for authentication.
● Key Features:
o Single sign-on across network resources.
● Main Components:
o Authentication Server (AS): Verifies client identity.
● Additional Features:
● Transport Mode: Encrypts data only, not headers. Good for device-to-device
communication.
● Tunnel Mode: Encrypts full packets, concealing original IP addresses. Ideal for
network-to-network links.
● Implication: Security must follow the data, not stay bound to network boundaries.
● Solution: Adopt Zero Trust models—never trust, always verify.
Key Takeaways
● The network perimeter is dynamic, not fixed.