Download presentation
Presentation is loading. Please wait.
Published byHarriet Whitehead Modified over 9 years ago
1
System Access Controls Eric Gibson Jr
2
Growing Use of Computers Smartphone alarm clock dependency Source for sending communications Store personal information Over 2,267,233,742 internet users
3
What Are System Access Controls? Computer system access controls are a powerful toolset that is used to secure individual and company systems that are in use every day.
4
3 Step Process in Access Controls User Identification – Identification is the process of supplying the system with information that tells the system who you are. User Authorization – Process of proving to the system you are who you say you are. User Authorization – Process of allowing the user into the system User Identification and Authentication (video) – http://www.youtube.com/watch?v=nq4LwKno9hQ&fe ature=channel&list=UL http://www.youtube.com/watch?v=nq4LwKno9hQ&fe ature=channel&list=UL
5
How Secure Are You? Pentagon consulting firm hacked into on July 11, 2011. Common mistakes in password defining Common mistakes in storing physical forms of authentication Common mistakes among system administrators
6
Access Control Models and Techniques System Administrators can utilize different techniques and follow different models based on business needs when defining user access across a system. – Discretionary access controls (DAC) – Mandatory access controls (MAC) – Role-based access controls (RBAC) Authorization and Access Controls (video) – http://www.youtube.com/watch?v=_msfQmCEv4I http://www.youtube.com/watch?v=_msfQmCEv4I
7
Access Control Technologies Single Sign-On – a technology that can be used within a system that allows a user to enter their credentials one time. Directory Services – simplify the authorization process for many users by providing access to network resources automatically.
8
Access Control Technologies (cont.) Kerberos – Ticket-based secure method for authenticating a request for a service on a network – Developed in the Athena Project at the Massachusetts Institute of Technology (MIT) – Named after the three-headed watch dog that guarded the gates of Hades in Greek Mythology
10
The End
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.