Lecture 7
Lecture 7
04/29/2024
Eng. Mohamed Jaambiir
Computer System Security
COS-413
Lecture Seven
Eng. Mohamed Jaambiir
2
What is Network Access Control?
Network Access Control is a security solution that uses a set of protocols to keep
unauthorized users and devices out of a private network or give restricted access to the
devices which are compliant with network security policies.
Network access control is the act of keeping unauthorized users and devices out of a
private network.
It handles network management and security that implements security policy,
compliance, and management of access control to a network.
NAC works on wired and wireless networks by identifying different devices that are
connected to the network.
Eng. Mohamed Jaambiir 04/29/2024
3
Components of Network Access Control
Scheme:
A. Gather Data: Perform an exhaustive survey and collect information about every device,
user, and server that has to interface with the network resources.
B. Manage Identities: Verify user identities within the organization by authentication and
authorization.
C. Determine Permissions: Create permission policies stating different access levels for
identified user groups.
D. Apply for Permissions: Apply permission policies on identified user groups and register
each user in the NAC system to trace their access level and activity within the network.
E. Update: Monitor security operations and make adjustments to permission policies based on
changing requirements of the organization with time.
Eng. Mohamed Jaambiir 04/29/2024
6
Responsibilities:
Organizations that allow employees to use their own devices or take corporate
devices home use NAC to ensure network security.
Organizations use NAC to grant access to different network resources to people or
devices that are outside of the organization and are subjected to different security
controls.
NAC protects from threats caused due to use of IoT devices by categorizing IoT
devices into groups that have limited permission and constantly monitoring their
activities.
1. Authentication
Authentication is the initial process of establishing the identity of a user.
For example, when a user signs in to their email service or online banking
account with a username and password combination, their identity has
been authenticated. However, authentication alone is not sufficient to
protect organizations’ data.
2. Authorization
Authorization adds an extra layer of security to the authentication process. It specifies
access rights and privileges to resources to determine whether the user should be
granted access to data or make a specific transaction.
For example, an email service or online bank account can require users to
provide two-factor authentication (2FA), which is typically a combination of
something they know (such as a password), something they possess (such as a token),
or something they are (like a biometric verification). This information can also be
verified through a 2FA mobile app or a thumbprint scan on a smartphone.
3. Access
Once a user has completed the authentication and authorization steps, their identity will be verified.
This grants them access to the resource they are attempting to log in to.
4. Manage
Organizations can manage their access control system by adding and removing the authentication and
authorization of their users and systems. Managing these systems can become complex in modern IT
environments that comprise cloud services and on-premises systems.
5. Audit
Organizations can enforce the principle of least privilege through the access control audit process. This
enables them to gather data around user activity and analyze that information to discover potential
access violations.
Eng. Mohamed Jaambiir 04/29/2024
12
Physical Access Control
Access control is used to verify the identity of users attempting to log in to digital resources. But it is also
used to grant access to physical buildings and physical devices.
Barroom Bouncers
Bouncers can establish an access control list to verify IDs and ensure people entering bars are of legal age.
Subway Turnstiles
Access control is used at subway turnstiles to only allow verified people to use subway systems. Subway
users scan cards that immediately recognize the user and verify they have enough credit to use the service.
Keycard or Badge Scanners in Corporate Offices
Organizations can protect their offices by using scanners that provide mandatory access control.
Employees need to scan a keycard or badge to verify their identity before they can access the building.
Eng. Mohamed Jaambiir 04/29/2024
13
5. Mandatory Access Control (MAC): A control model in which access rights are regulated by a
central authority based on multiple levels of security. Security Enhanced Linux is implemented
using MAC on the Linux operating system.
6. Organization-Based Access control (OrBAC): This model allows the policy designer to
define a security policy independently of the implementation.
7. Role-Based Access Control (RBAC): RBAC allows access based on the job title. RBAC
eliminates discretion on a large scale when providing access to objects. For example, there
should not be permissions for human resources specialist to create network accounts.
8. Rule-Based Access Control (RAC): RAC method is largely context based. Example of this
would be only allowing students to use the labs during a certain time of day.
Eng. Mohamed Jaambiir 04/29/2024
16
The Importance of Access Control
An access control policy is a set of general requirements defining how the organization will
implement access control. Some elements of an access control policy include:
Purpose: Defines the goals of the access control policy, including the assets being protected
and their security requirements.
Access Control Model: Defines whether the system will use MAC, DAC, RBAC, or ABAC
to manage access.
Security Enforcement: Specifies the tools and methods that will be used to implement and
enforce access control policies.
Implementation Guides: Provides guidance and best practices for implementing the
organization’s access control policy.
Eng. Mohamed Jaambiir 04/29/2024
18
Access Control Best Practices
The End
Eng. Mohamed Jaambiir 04/29/2024