Download presentation
Presentation is loading. Please wait.
1
Cybersecurity 101 Dr. X
2
So far we have learned… abreviation soup
Basics of computers: HW, OS, SW, bin Basics of CL Cyber Crime Cyber War Malware Passwords
3
Today we fight back Access controls:
What are the four parts of access control? Download slides, they include an exercise that we will do today
4
Access Control (AC) Definition Access control refers to security features that control who can access resources in the operating system. Applications call access control functions to set who can access specific resources or control access to resources provided by the application.
5
Access controls and Security Pillars
Which parts of CIANA do access controls protect? Why?
6
Access Controls – Windows & Mac
Windows exercise! Open windows explorer Right click on any file Click on “Properties” Look at the bottom of the new window: “Attributes” Take a screenshot and save it in a word document This is the beginning of your report for this lab What did you observe? What does it have to do with access controls? Include your answers in the word doc.
7
Access Controls – Windows & Mac
Mac exercise! Open finder Right click on any file Click on “Get Info” Look at the bottom of the new window: “Sharing and permissions” Take a screenshot and save it in a word document This is the beginning of your report for this lab What did you observe? What does it have to do with access controls? Include your answers in the word doc.
8
Access control Individual Group
9
Access control command line - Windows
Go to start, type cmd Go to the folder where you save your FYE homework assignments Use the cd command to do this Type: dir /Q What is printed? What does this command do? Which part is the access control and why?
10
Access control command line - Mac
Open a terminal on your mac Go to the folder where you save your FYE homework assignments Use the cd command to do this Type: ls –al What is printed? What does this command do? Which part is the access control and why?
11
Think like a hacker How/Why would a hacker use access control on command line and not on Finder/Windows Explorer? How can you find out if someone is running something “fishy” on your computer? Windows Mac
12
Access control What you have What you know What you are
13
Add to your report! How can one hack: What you have? What you know?
What you are? Think of at least two hacks for each bullet above.
14
Sources ml
15
Podcasts! The Cyberwire: https://thecyberwire.com/podcasts/
Security now:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.