Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.

Slides:



Advertisements
Similar presentations
Access Control CS461/ECE422 Fall Reading Material Chapter 4 through section 4.5 Chapters 23 and 24 – For the access control aspects of Unix and.
Advertisements

Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Access Control Intro, DAC and MAC System Security.
Bilkent University Department of Computer Engineering
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
Chapter 14: Protection.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Access Control: Part I Chao-Hsien Chu, Ph.D.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
Protection.
ECE509 Cyber Security : Concept, Theory, and Practice Access Control Matrix Spring 2014.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 4 “Access Control”.
14.1 Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 14: Protection Goals of Protection Principles of Protection Domain of Protection.
Computer Security: Principles and Practice
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
G53SEC 1 Access Control principals, objects and their operations.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Silberschatz, Galvin and Gagne  Operating System Concepts Chapter 18: Protection Goals of Protection Objects and Domains Access Matrix Implementation.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Chapter 14: Protection.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Protection (Chapter 14)
Protection Nadeem Majeed Choudhary
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Chapter 14: Protection Goals.
Access Control: Policies and Mechanisms Vinod Ganapathy.
Chapter 14: Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts – 7 th Edition, Apr 11, 2005 Goals of Protection Operating.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts – 9 th Edition Chapter 14: Protection.
File Systems.  Issues for OS  Organize files  Directories structure  File types based on different accesses  Sequential, indexed sequential, indexed.
CSE Operating System Principles Protection.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
Chapter 17: System Protection Silberschatz, Galvin and Gagne ©2005 Operating System Concepts Chapter 17: Protection Goals of Protection Principles.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Chapter 4 – Access Control.
Access Control Model SAM-5.
Lecture 7 Access Control
PROTECTION.
Protection and Security
Chapter 14: Protection Modified by Dr. Neerja Mhaskar for CS 3SH3.
Chapter 14: System Protection
Chapter 14: Protection.
Chapter 14: Protection Source & Copyright: Operating System Concepts, Silberschatz, Galvin and Gagne.
Chapter 14: Protection.
Chapter 4 Access Control
Chapter 14: Protection.
CE Operating Systems Lecture 21
Chapter 14: Protection.
Chapter 14: Protection.
OS Access Control Mauricio Sifontes.
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
Access Control.
Principles and Practice
Chapter 14: Protection.
Chapter 14: Protection.
Chapter 14: Protection.
CS703 - Advanced Operating Systems
Chapter 14: Protection.
Presentation transcript:

Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control

Access Control  “The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner“  central element of computer security  assume have users and groups authenticate to system authenticate to system assigned access rights to certain resources on system assigned access rights to certain resources on system

Access Control Principles

Access Control Policies

Access Control Requirements  reliable input  fine and coarse specifications  least privilege  separation of duty  open and closed policies  policy combinations, conflict resolution  administrative policies

Access Control Elements  subject - entity that can access objects a process representing user/application a process representing user/application often have 3 classes: owner, group, world often have 3 classes: owner, group, world  object - access controlled resource e.g. files, directories, records, programs etc e.g. files, directories, records, programs etc number/type depend on environment number/type depend on environment  access right - way in which subject accesses an object e.g. read, write, execute, delete, create, search e.g. read, write, execute, delete, create, search

Discretionary Access Control  often provided using an access matrix lists subjects in one dimension (rows) lists subjects in one dimension (rows) lists objects in the other dimension (columns) lists objects in the other dimension (columns) each entry specifies access rights of the specified subject to that object each entry specifies access rights of the specified subject to that object  access matrix is often sparse  can decompose by either row or column

Access Control Structures

Access Control Model

Access Control Function

Protection Domains  set of objects with associated access rights  in access matrix view, each row defines a protection domain but not necessarily just a user but not necessarily just a user may be a limited subset of user’s rights may be a limited subset of user’s rights applied to a more restricted process applied to a more restricted process  may be static or dynamic

UNIX File Concepts  UNIX files administered using inodes control structure with key info on file control structure with key info on file attributes, permissions of a single fileattributes, permissions of a single file may have several names for same inode may have several names for same inode have inode table / list for all files on a disk have inode table / list for all files on a disk copied to memory when disk mountedcopied to memory when disk mounted  directories form a hierarchical tree may contain files or other directories may contain files or other directories are a file of names and inode numbers are a file of names and inode numbers

UNIX File Access Control

 “set user ID”(SetUID) or “set group ID”(SetGID) system temporarily uses rights of the file owner / group in addition to the real user’s rights when making access control decisions system temporarily uses rights of the file owner / group in addition to the real user’s rights when making access control decisions enables privileged programs to access files / resources not generally accessible enables privileged programs to access files / resources not generally accessible  sticky bit on directory limits rename/move/delete to owner on directory limits rename/move/delete to owner  superuser is exempt from usual access control restrictions is exempt from usual access control restrictions

UNIX Access Control Lists  modern UNIX systems support ACLs  can specify any number of additional users / groups and associated rwx permissions  ACLs are optional extensions to std perms  group perms also set max ACL perms  when access is required select most appropriate ACL select most appropriate ACL owner, named users, owning / named groups, othersowner, named users, owning / named groups, others check if have sufficient permissions for access check if have sufficient permissions for access

Role- Based Access Control

NIST RBAC Model

RBAC For a Bank

Summary  introduced access control principles subjects, objects, access rights subjects, objects, access rights  discretionary access controls access matrix, access control lists (ACLs), capability tickets access matrix, access control lists (ACLs), capability tickets UNIX traditional and ACL mechanisms UNIX traditional and ACL mechanisms  role-based access control  case study