System Access Controls Eric Gibson Jr
Growing Use of Computers Smartphone alarm clock dependency Source for sending communications Store personal information Over 2,267,233,742 internet users
What Are System Access Controls? Computer system access controls are a powerful toolset that is used to secure individual and company systems that are in use every day.
3 Step Process in Access Controls User Identification – Identification is the process of supplying the system with information that tells the system who you are. User Authorization – Process of proving to the system you are who you say you are. User Authorization – Process of allowing the user into the system User Identification and Authentication (video) – ature=channel&list=UL ature=channel&list=UL
How Secure Are You? Pentagon consulting firm hacked into on July 11, Common mistakes in password defining Common mistakes in storing physical forms of authentication Common mistakes among system administrators
Access Control Models and Techniques System Administrators can utilize different techniques and follow different models based on business needs when defining user access across a system. – Discretionary access controls (DAC) – Mandatory access controls (MAC) – Role-based access controls (RBAC) Authorization and Access Controls (video) –
Access Control Technologies Single Sign-On – a technology that can be used within a system that allows a user to enter their credentials one time. Directory Services – simplify the authorization process for many users by providing access to network resources automatically.
Access Control Technologies (cont.) Kerberos – Ticket-based secure method for authenticating a request for a service on a network – Developed in the Athena Project at the Massachusetts Institute of Technology (MIT) – Named after the three-headed watch dog that guarded the gates of Hades in Greek Mythology
The End