Module 01 Jan 2025
Module 01 Jan 2025
access to the information and resources needed to perform their responsibilities but
no more.
being protected.
The only way that information can be both useful and safe is through strong
access controls.
Fundamental concepts
What Is Access?
• Access refers to the ability of a subject to interact with an object. That interaction is the basis of everything
we do, both in the information technology (IT) field and in life in general.
• Access can be defined in terms of social rules, physical barriers, or informational restrictions.
In this scenario, the “visitor is the subject” and the “busy-executive(HoD) is the object”.
The “administrative assistant serves as the access control system”, restricting what individuals (subjects) may access
the executive (object).
Scenario (example)
The locked door physically restricts access by anyone without a key to the assets stored
inside your house - your TV, computer, and stereo system.
When you come home, you unlock the door and replace the physical restriction of the
locking mechanism with a human gatekeeper who decides whether or not to let someone
enter the house.
What Is Access Control?
Access controls define the allowable interactions between subjects and objects.
• Policies — The rules that govern who gets access to which resources
• Objects — The resource to which the subject desires access (e.g., files, databases, printers)
Any time you have to decide whether to allow or deny access by a subject to a resource, you have entered
the access control problem domain.
Access Control Systems - elements
A well-defined access control system consists of three elements:
The subject in an access control scenario is a person or another application requesting access to a resource such as
the network, a file system, or a printer.
There are three types of subjects when it comes to access control for a specific resource:
• Authorized—Those who have presented authenticated credentials and have been approved for access to the
resource
• Unauthorized—Those who have presented authenticated credentials but are not approved for access to the
resource
authenticate. For example, someone might be asked to provide a username and password.
1) If the user’s password is correct, the system knows with certainty who the user is and now it must check, if the
1a) Someone allowed to access the resource moves to the “authorized” state.
1b) Otherwise, the user is still known, but now moves to the “unauthorized” state.
2) If the user does not provide the correct password, the system still does not know who the user is and he or she
• Applications—An application can be a subject when it attempts to access other resources on the
same computer or over the network.
• Processes—A process is most commonly a subject when an application process requests low-
level access to the file system.
• Networks—A network is a subject when a resource on one network requests access to a resource
on another network. (A firewall rule that authorizes access to the Internet might use the internal
network as a subject, with the Internet as the object.)
• Systems—A system is a subject when one system requests access to resources on another system
or on the network. (This usually happens when a PC attempts to access a printer across the
network)
AAA (or “triple A”) security
AAA (or “triple A”) security process involves three components: