What are the Access control categories?
Access Control Models
The Bell-LaPadula Model
Implements a combination of discretionary and mandatory access controls(DAC and MAC) and is primarily concerned with the confidentiality of the resource in question. In other words, making sure unauthorized people can’t read it. MAC precedes DAC. Two security properties define how information can flow:
* The Simple Security Property: The level of access to an individual must be as high as the classification of the resource in order for the individual to access it.
* The * Property(Star Property): Anyone accessing a resource can only write(or copy) its contents to another resource classified at the same level or higher.
The Biba Model
The Biba model of access control is primarily concerned with protecting the integrity of data, even at the expense of confidentiality. It has two security rules:
* The Simple Integrity Axiom: The lvel of access granted to an individual must be no lower than the classification of the resource.
* The * Integrity Axiom: Anyone accessing a resource can only write its contents to a resource classified at the same level or lower.
The Brewer and Nash Model
The Brewer and Nash model AKA Chinese Wall is an access control model designed to prevent conflicts of interest. This model is commonly used in industries that handle sensitive data such as the financial, medical, or legal industries.
This model considers three main resource classes:
* Objects: Resources, such as files, information
* Company Groups: All objects pertaining to an organization.
* Conflict Classes: All groups of objects concerning competing parties.
Cross-Site Request Forgery
Clickjacking