Access control techniques Once an organization decides upon the access control model it will implement(DAC,MAC, or RBAC), then it needs to look at the.

Slides:



Advertisements
Similar presentations
ImageNow at LaSalle University Julie Riganati
Advertisements

GCSE ICT By the end of this session, you will be able to: Explain main features of ATM machines Identify features of credit cards, debit cards, smart cards.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Jan. 2014Dr. Yangjun Chen ACS Database security and authorization (Ch. 22, 3 rd ed. – Ch. 23, 4 th ed. – Ch. 24, 6 th )
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
2009 Architecture Plan Overview 2009 Architecture Plan Overview.
Tables Lesson 6. Skills Matrix Tables Tables store data. Tables are relational –They store data organized as row and columns. –Data can be retrieved.
Database Management System
$$$$$$$ Know your Money! Financial Institutions and Services.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Security Fall 2009McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
1 SYS366 Week 1 - Lecture 2 How Businesses Work. 2 Today How Businesses Work What is a System Types of Systems The Role of the Systems Analyst The Programmer/Analyst.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
9.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 9: Installing and Configuring.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
Income and Taxes.  Salary – set amount of money earned by an employee per year or other fixed length of time  A portion of the salary is paid at regular.
Palantir A window-sharing system for Windows NT Max Feingold, Vladimir Livshits, and.
1 Software Testing and Quality Assurance Lecture 30 – Testing Systems.
SE571 Security in Computing
User Domain Policies.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Present by Napasakorn Sukjay Poom Samaharn
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Installing software on personal computer
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Checking Accounts. What is a Checking Account? 1.A checking account is a sum of money that you deposit in a bank or other financial institution, to hold.
Bank On It 1. 2 Purpose Bank On It : Is an overview of banking services. Will help you build a positive relationship with banks, thrifts, and credit unions.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Lecture 18 Page 1 CS 111 Online Access Control Security could be easy – If we didn’t want anyone to get access to anything The trick is giving access to.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Section 2 17 Chapter Financial Services & Electronic Banking.
SEC835 Practical aspects of security implementation Part 1.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Chapter 8 Evaluating Alternatives for Requirements, Environment, and Implementation.
Chapter 3, Section 3 ELECTRONIC BANKING.
ICT and Banks Banks use mainframe computers to maintain customer accounts. They store a record of each customer’s withdrawals and deposits. Each bank mainframe.
Computer Emergency Notification System (CENS)
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Personal & Business Record Keeping Concept 3. LEQ 1 What are the basics of record keeping for personal and business accounts?
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
G53SEC 1 Access Control principals, objects and their operations.
1 Figure 9-10: Database and Instant Messaging Security Concerns Other Applications  There are many other applications  Each has its own security issues.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Computer Security: Principles and Practice
Access Control Chapter 3 Part 4 Pages 227 to 241.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Chapter 3: Software Design –Use case Diagram Nouf Alghanmi.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
© Arbela Technologies Accounts Payable + Procurement & Sourcing Workflows.
{ Your Checking Account Senior Advisory May 17, 2016.
Information Security Access Control.
I Wanted To Order This Book
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
GMS.NET Security Overview.
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
Employee Self-Service (ESS) Time and Labor PeopleSoft HR Management System(HRMS) 9.2 Upgrade Overview of Changes/Updates.
Configuring Internet-related services
Microsoft Office Access 2003
OS Access Control Mauricio Sifontes.
Presentation transcript:

Access control techniques

Once an organization decides upon the access control model it will implement(DAC,MAC, or RBAC), then it needs to look at the different possible access control techniques that are available to work within these models and supplement their mechanisms. The following sections explain some of the available access control techniques.

objectoperationsubject Classification lookup Role lookup Permissions lookup lattice read, write, execute Read, write Read Figure 2.6 A lattice is an upper and lower bounds of access

Restricted Interfaces Users’ environments can be constructed and controlled, which is another approach to controlling the objects they have access to. An administrator can create a user profile that will provide a user’s working environment. This profile allows the administrator to dictate what icons, menus, applications, commands, and functionality is available within that environment. It is considered a restricted interface because the user utilizes the provided environment, desktop, and profile to interface with the operating system, installed applications, and resources. Another example of a restricted interface is a database view. A database administrator can implement database views, which will show only the information within the database that the user has the necessary access rights to view. So the payroll department may be able to view employee salary and commission information, but not individual’s employment records and human resource information

Different department managers may be able to view their employees’ employment records, but not their salary and commission information. Database views are controls that allow the database administrator to logically partition the database and present these specific pieces to different authenticated users. The last restricted interface access control technique we look at is a physically constrained interface. The best example of this type of access control is an automated teller machine (ATM). These systems have operating systems that have many more capabilities than transferring, depositing, and withdrawing funds, but users of these machines are presented only with buttons for these specific functions and no more. Thus, the physically constrained interface provides limited options and only a few buttons so any other functions that the operating system can actually perform are not accessible by regular users.

Capability Table and ACLs access control matrix is a mechanism used to associate access permissions of a subject to an object. The actual permissions assigned to a subject, which is a row within the access control matrix, is referred to as a capability table. And the different subjects that can access an object are referred to as an access control list (ACL), which are the columns of the matrix, as shown in Figure 2-7. When a subject requests to access a specific object, the operating system will refer to this access control matrix to see if the access and An requested operation is allowed

Access control matrix file4file3file2file1 subject Read, write read Read, write readlarry read Full control No access Full control curly Full control readNo access Read, write mo No access Full control bob capability ACL Figure2.7 capability tables are bound to subjects; ACLs are bound to objects.

Content-Dependent Access Control Content-dependent control is another technique used, which is based on the object’s content that the subject is trying to access. It is usually implemented in databases. For example, a database may contain sensitive medical information; the more sensitive this data is, the fewer the number of people that will be able to access it. Let’s say the database holds the results of different tests that have been performed on a particular patient. If a lab technician requests to see these results, she may be shown only that the tests were completed successfully, on what date, and by whom. If a nurse requests to see this information, she may be given access to a little bit more of the information than the lab technician, but not sensitive information, as in the patient has positive signs of malaria. And when a physician requests to see the same set of information, she may have access to all test data and results.

Content-dependent access controls require a lot of resources and Overhead because the database will need to scan the object to determine if a particular subject can actually access it. The more granularity that is configured and expected from these types of controls will equate to more resources needed to evaluate requests.

Other Access Techniques The following access control types are more granular in nature and can be used in combination with any of the previously discussed controls and models. The operating system or application would need to provide these types of controls for them to be available to be configured by the administrator or security officer. 1-Physical location :- A user may be allowed access to a resource only if she has interactively logged in to a computer, meaning that she is physically at a computer and not logged in remotely. 2-Logical location :- An administrator can restrict access to resources by IP addresses, which is a logical location on a network. 3-Time of day:- A control mechanism can be configured to only allow access to resources between certain hours of the day and certain days of the week.

4-Transaction type:- Restrictions based on operations that are requested to be carried out. A bank teller may be able to deposit checks but not cash checks. This would be a type of transaction access restriction.