Unit 002 Access Control
Unit 002 Access Control
https://jamboard.google.com/d/1
cKTCQpX96OVszAzvh_-gCp2SjCIKL
G66EIH97ebylFk/viewer?f=0
Role of access control in organisations
• Confidentiality
• Integrity and availability
• Limiting access to systems
• Limiting access to data
• Providing “defence in depth”
• Identifying and classifying data
assets
For more information about role of
access control, please click on link
below: What legislation would be related to
https://securityboulevard.com/2020/11 access control?
/the-role-of-access-control-in-informatio
Primary categories used to define access to
data
• Directive (codes of conduct, security policies and procedures)-directs, confines, or
controls the actions of subjects to force or encourage compliance
with security policy.
• Preventative (physically restricting access)- deployed to stop an unwanted or
unauthorised activity from occurring.
• Compensating (additional guards during periods of heightened threat)
• Detective (intrusion detection systems)
• Corrective (software patches, firewall reconfiguration)
• Recovery (updating of security policies to reflect changes in business).
(Beyond identity)
Access control IT policies
Insider Threats
Can be difficult to detect since the users already have
legitimate access to the system. Without an access
control policy in place, these users can widely misuse the
IT resources of the company. They can access top-level
information, steal data for personal gain, spread
malicious code, or initiate attacks.
External Threats
Hackers are always looking for any vulnerability in a
system. Hacked passwords remain one of the most
common ways to gain unauthorized access and create
havoc. Without a rigorous access control policy in place,
a hacker who has stolen credentials of someone with
higher privileges can go undetected and cause very
serious damage to company data.
Scenario activities