Process of Protecting a Resource so that it used by only those allowed use it. Methods to restrict and allow access to certain items. (Codes, Keys, Passwords, Fingerprints, Combinations).
Access Controls
Process of deciding how has access to what computer and network resources. Based on job roles, background screening, and any gov. requirements.
Authorization
Assigns privileges at a user level. Very difficult to manage since every person has unique privileges. Very detailed and controlling
User-Based Privileges
Assigns privileges based on group policy. Easy to manage since assigning a person to a group automatically gives them those privileges (Student group)
Group-Based Privileges
Set of rules that allows a special group for users to perform a set of actions on a set of resources
Access Control Policy
People/Processes that use the system & perform some services
Users/Subjects
Protected Objects in the system. This can be accessed only buy authorized subjects(users). This can only be used in authorized ways.
Resources
Activities that authorized users can perform on the resources
Actions
Permissions granted to an authorized user, such as to read, write, execute
Relationships
These controls can control access to physical resources. (Parking Lots, protected areas)
Physical Access Controls
These controls can control access to a computer system/network
Logical Access Controls
This asks the question ‘Who is asking to access the asset?’
Identificaiton
This asks the question ‘Can the requestor’s ID be verified?’
Authentication
This asks the question ‘What exactly can the requestor access and do?
Authorization
This asks the question ‘How can the actions be traced to the individual, and what methods are in place to track the actions of users?’
Accountability
Common ID method through smart card, key FOB automatically.
Username
Uses Physical Traits of the User (Fingerprints, Voice, facial recognition.)
Biometrics
Account policies should PROHIBIT this to allow for attribution of Actions
General/Guest Accounts and Account Sharing.
Authentication type that is Something the User Knows (Passwords, Passphrase, pin# etc.)
Knowledge
Disables the ability to login after a set amount of consecutive failed attempts. (Prevents Brute Force/Dictionary Attacks)
Lockout Policy
Authentication type that is something the user has. (Smart Card, FOB, Badge, etc.)
Ownership
An algorithm that calculates a number on both the authentication server & the device held by the user. User would then enter the number on the device, and it would be compared to the server for authentication
Synchronous Token
Authentication type that is Something the User Is (Physical Attributes, Fingerprints, Optical/Facial Recognition)
Characteristics
Measures various parts of a person’s anatomy/physical activities.
Biometrics