Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.

Slides:



Advertisements
Similar presentations
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #12-1 Chapter 12: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Advertisements

Jan. 2014Dr. Yangjun Chen ACS Database security and authorization (Ch. 22, 3 rd ed. – Ch. 23, 4 th ed. – Ch. 24, 6 th )
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
Access Control Methodologies
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
Database Security - Farkas 1 Database Security and Privacy.
Access Control Intro, DAC and MAC System Security.
Chapter 11 Firewalls.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
1 Design Principles CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 13, 2004.
Protection. Goals of Protection Operating system consists of a collection of objects, hardware or software Each object has a unique name and can be accessed.
Security Fall 2009McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Design Principles Overview Principles Least Privilege Fail-Safe Defaults Economy of Mechanism Complete Mediation Open Design Separation of Privilege Least.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 14: Protection.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
G Robert Grimm New York University Protection and the Control of Information Sharing in Multics.
C. Edward Chow Presented by Mousa Alhazzazi C. Edward Chow Presented by Mousa Alhazzazi Design Principles for Secure.
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Access Control and Privilege Management
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 4 – Access Control.
G53SEC 1 Access Control principals, objects and their operations.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Academic Year 2014 Spring Academic Year 2014 Spring.
(Breather)‏ Principles of Secure Design by Matt Bishop (augmented by Michael Rothstein)‏
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
What is Access Control? Discretionary Access Control (DAC)
Computer Security: Principles and Practice
Fall 2008CS 334: Computer SecuritySlide #1 Design Principles Thanks to Matt Bishop.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
June 1, 2004Computer Security: Art and Science © Matt Bishop Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Chapter 14: Controlling and Monitoring Access. Comparing Access Control Models Comparing permissions, rights, and privileges Understanding authorization.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
1 Chapter 12: Design Principles Overview –There are principles for many kinds of design Generally, a design should consider: Balance, Rhythm, Proportion,
June 1, 2004© Matt Bishop [Changed by Hamid R. Shahriari] Slide #13-1 Chapter 13: Design Principles Overview Principles –Least Privilege –Fail-Safe.
Slide #13-1 Design Principles CS461/ECE422 Computer Security I Fall 2008 Based on slides provided by Matt Bishop for use with Computer Security: Art and.
1 Saltzer [1974] and later Saltzer and Schroeder [1975] list the following principles of the design of secure protection systems, which are still valid:
Security Principles.
1 Design Principles CS461 / ECE422 Spring Overview Simplicity  Less to go wrong  Fewer possible inconsistencies  Easy to understand Restriction.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Access Control Model SAM-5.
Protection and Security
Chapter 14: System Protection
Computer Data Security & Privacy
CE Operating Systems Lecture 21
OS Access Control Mauricio Sifontes.
Access Control.
Access Control What’s New?
Access Control Dr. X Parenthesis: before we dive deeper into crypto, we will explore and old but still valid security principle, access controls.
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Presentation transcript:

Access Control

What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow unauthorized users, programs or process system or resource access An entire set of procedures performed by hardware, software and administrators – To monitor access – Identify users requesting access – Record access attempts – Grant or deny access based on pre-established rules

Examples of Access Control Social Networks: login system, e.g., only account owner can log on to his/her account Web Browsers: same-origin poliey Operating Systems: process isolation; memory protection Networking: firewall

Design Principles Economy of mechanism: keep the design as simple and small as possible Fail-safe defaults: base access decisions on permission not exclusion Complete mediation: access to an object must be checked for authority Open design: the design should not be secret Separation of privilege: a protection mechanism that requires two keys to unlock it is more robust Least privilege: every program and every user of the system should operate using the least set of privileges necessary to complete the job Least common mechanism: minimize the amount of mechanism common to more than one user and depended on by all users Psychological acceptability: it is essential that the human interface be designed for ease of use, so that users routinely and automatically apply the protection mechanisms correctly.

Design and Implementation How access control policies are configured: – Discretionary Access Control (DAC) – Mandatory Access Control (MAC) How access control is implemented: – Access Control Matrices – Access Control List – Capability List – Role-Based Access Control

DAC: Discretionary Access Control Individual user can set an access control mechanism to allow/deny access to an object Rely on the object owner to control access Widely implemented in most operating systems Strength of DAC: flexibility, a key reason why it is widely known and implemented in mainstream operating systems

MAC: Mandatory Access Control A policy mandates who is allowed to have access; individual user cannot alter that access Rely on the system to control access. MAC mechanisms have been tightly coupled to a few security models – Bell-LaPadula (BLP) – Biba Systems supporting MAC, e.g., SELinux, TrustedBSD

Access Control Methods I Access Control Matrices – Disadvantage: large matrix size; mostly sparse matrix Access Control List: column of access control matrix – Advantage: Easy to determine who can access a given object Easy to revoke all access to an object – Disadvantage: Difficult to know the access right of a given subject Difficult to revoke a user’s right on all objects

Access Control Methods II Capability List: row of access control matrix. – Advantage: Easy to know the access right of a given subject Easy to revoke a users access right on all objects – Disadvantage: Difficult to know who can access a given object Difficult to revoke all access right to an object

Access Control List Examples UNIX ACL – Abbreviations of Access Control Lists: three classes: owner, group, and other users – Full Access Control Lists Windows NT – Generic rights: No access, Read, Change, Full control. – Built-in Groups; each with different privileges Everyone: all users Interactive: users logged on locally Network: users logged on over the network System: the operating system Creator / Owner: creator or owner of a file or a resource Social networks – Most social networks use ACL as its main access control model. Users can specify who can access their profiles, friend lists, etc. How is the ACL implemented in operating systems? – ACL is saved in the i-node data structure

Exercise