0% found this document useful (0 votes)
681 views28 pages

Authentication & Access Control Guide

The document discusses authentication, identification, and authorization in information security systems. It defines authentication as verifying a user's identity, identification as determining who someone is, and authorization as determining what permissions a user has. It also discusses password attacks like dictionary attacks and brute force attacks that try to crack passwords stored in systems.

Uploaded by

Komal Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
681 views28 pages

Authentication & Access Control Guide

The document discusses authentication, identification, and authorization in information security systems. It defines authentication as verifying a user's identity, identification as determining who someone is, and authorization as determining what permissions a user has. It also discusses password attacks like dictionary attacks and brute force attacks that try to crack passwords stored in systems.

Uploaded by

Komal Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Page No.

Date

sea Authenticatlon Access Contaol

paocess byiwhich system veaify the


ile
AuthenticoiLSeAwho vishesto actess System- he
identit0f
to effedive seruaity
is essential
Authentia
is ilmplement haaush usezD
DPX
WsexAuthentiafion' iihi
Fassoad
aae:=
ameofechnÍqueS USed fox Authenticatian

usedHodigitally idénify fexsonto aana a


iometaic
ox dataExamples of biometaic
is
: Sustemjdevice
todexPaint,
factal palean vaice d.x typin1 cadence

Authoization is mechantsm by which system


to pentoam
a
g2an44 o
2x 3evake aiIht toiacce53 Somerdata
some dotlon

Accesscontaol is caltical to minimize SyStem vulnaahilt-


LXestait not only who oa what hasaces.s to the
XeSou&ce hut alsa type ofacess
th attisPeamitted-
|PageNo.
Date

DENITETAIION AND AUTHENITCATTON


identification means fincdin out who
no
Aulhen.cotion is mèchantsm veaify he ldentiti Someon

Tdentiticatian claim an ldenityaulhenhn


is paoving it

2InSimple teams Peason claim to beanu


knoin ds identiEicatton dnd Ifi yaua paoving the
idenity is knovn as authenticaion

Tdentifitalion who axe you


Thepaacessused todecagnlze an individ
UGex is ay by which indvidual claim hisher
identity toSystem
Thig can be_achiievediw ith uSeamme smaz
Cadanythina else hat úniguly iolentify
Secuaity Systenm use this identi hendelan.
jfUGea Con access_anabiect-

Athenticrtian (who yau azeand han anyou paaye

Aulhenticatian is the paocess of detea minini


iendlty of usex
Aulhendic is Pxocess to p3ovins the iden-hiy
z AHhentic 15 Paocessof deleamin vhether e
Someone oxsomehini is
Page No.

Date

foa authenticate Sysi.em iH usually


asked fox
we aske
when enlex Us eanameasswoad to System-
means
enlea

hen Usea
aovide
paoy
Coddect uSPanane pags a wozd then
hen_usea
aidthat
thati
s1s0Wnex tahe.system
itSald

(whot can Ido2) Which


Authoaizetlon
Authoaizctios i PXocesS to deteaminins
hove.
0eAMi5Son aPexson 0 Systemshould
7m
adminislaatozx
multiyeeasystemiSyslem system ashellL
hich useasdltoedacces s ta
fine vhic
e 0f use fox whlch they axe
Jetige
de eliaible

asPaivilles
Authaaiz 1Susually paoccecd withiauthentin.

who ase you ?


Tdentitication it
Authentic
ok Hon can yau Paióve

What can Tdo9


Authoaiz

deelde
Hexe Netwozk oxSyslem.adminisaatox
activities
which
which usea peafoam losin system eht
cannot access the teachex
Student maaks'etc
See his hea feesdetails
Studentonly can
con manipulate with maxkfees ete.
Teache
Page No.
Date

21:1Dsexnome d
passwoads

seaname 15 name that


OnaCompuitex system uniguly idepd
ndfy
ex Compudé SonEae
may havé muHipleactaurd
accoun has ts passwoad So
soenl each

USeaname/
to the 5y6tem
fasshiaad
combinatlón &fex talasin
in
Passwoad aaeypirally ysed in
wi Conuctuce
UGenameheyrdesigned Ho knaxwn oni-ts
andGain accessto deyviteapplc, the usex,
websitéete
Use staons pa ssnodd is essential topåotect he
Secuaityo idenliy

How fasswaa Authentie Waxká


A posswoxd is staing of
i
tettea digit d 6ymbol1) foa seachaaacdex'cindude
qulhanti oYex
omputex System

Stepl:checks USezname

Step2
Uge 8name/

the
Useaname
Passwo sd
for Netwook
2uthentO

PdssWosd Casaeness
Sepa:-£they signn
Sucesful loain
3 faituae.
Pago No
|Dato

Seleclon caideaia
Seledioo
915Swoacd
di
ictonaay mioad 141s easy lohacker
id usinguteletaonic ddinoay
riquae
to
lSepexsónalin foa m ike name Do B,o&
u fo
Dont fo foA Ou lovec ones
in-fo
aimlaa
aepetilve number oz lelHexs
idse4ueiajO
aAvala
ttayto úsegtdL:
mastpasswod
web ite alla
4Ee cose Sens1iveUSe
ebs1t. miXtuxe afuppeakase

wea ase as
Well asnumbeas
applih
rtte dffeaent Pags woad to dIffeaent

2uesSing aPasswoad
to con-Fiam -he
Poss Wnad 1S Secxet message
Used

identlty oFUSex
Posswoxd 9uesin9 is pXocess af altempHing
toainorcess to cSstem-th &ouih sySlemadiàlly
of passwoxdin aHempt to9aió
loain
uessing
on tax1et Gysem
xecaveaingPasswore
passwoad cXacking isPaaress of
tXom dada that havebeen Staaed in aat2ansmitted
bycompuiex system

ackinsPasswoad 1s diEficut task


Page No.
Date

msswoad caackins1s penetaating sysiem del


Steal file efense
containing valid possnosdiaDd decaye+ d
Using Use them fox unauthori2ed acc2ss hern
Ss'
A dictdnary iaa dixectoay altack:1s 9uessir
guessins
Passwaad bysepeated daiel and eaaoa

Inbaute faxceiattakatempt atto guess 41


the
passwoad toondccount by lo11Caly taying evea
Possible cámbination of chaaacdex unt|Passws
isdiscaveaed
hybaid attack iscombinalon
+
o baute-farcea4a
and dictanoayattack isused tocaak passwc
moxefastex.

21:3 Passwoxd AHacks


Pdsswaxd aaemost ommanly used
meahanISM o aut hertico-e Useasta an infoa m^
SyStem

Passwoad atack attacktaies to caack the passwate


Stoxed in netwnak acountdodabose

Thexeaxe two types a passwozd.atlack:

Dictfonaay attack
Baute -foace cttack.
Page No.
Dato

4la
Allack:
)Dicionaay aHack is tehniaueox
DiclLonaay compudex secuaity af
comnpu
ad baeadhthe
ethod
NOaddictianaay allackatlempttodefeat an
ROSS A by 5ysiemalica lly entea ed each
merhanism
a Pas3oad
as
a
dictonday
in a_dict
authentie
in of knomnPosswoad
ad
3d
1ThisHechnigueUSelist
substitulion f patean checklnato ind
list
Oa those that oxe discoverable
Passwaad
monlyused
by Peasonal
InFoamation numbers hhe
manyPeopleiaPpend Rahul ]23 misnt be
a
Noamally Rahul
ex
ex usex Nameso
USeanamne
the pasSwoad
ltle in-foamation is1knatun about People
)Ifa lit
TEa easiea
make_aaftackeiob
In_database the name afchildaen
Faeguently use
people yeaa as fasGnioad
numbejblaindate
addxess,phone foam ontheia vehsile
past PeXsan.alin
6peoPlefately they fotlo Ihése
spoat eam ckelebaitie
ahou the Ho attack Pexfoam dicttanday altok
all axe natuaalpath

eX: altacker
Name: 9 uess the
ase Passwodby
yea &o aboveinfo-
biath
Rohitshaama4
eomment:
Ilave dohit-|
Shaama
45Rohiti
Rehit!9s4
Rohi+ 28
Usex1aofile Shazma45l934
V
Comb1nt etonar
Faam (dictionar
Page No.
Date

Baute foace AHack


Bautehodce àtackls hohi
kina
method that uses-taialand ex aos to acka.
logincaedentia entayplion keys-

b&utefoace attack.williátemPt ts u se
loweacase leteauPPeacoserleitezy HH Dumber
Special chadachex unti1 it eyentually eico
Passwaad

baute foxce aHack: is guessirns fossyW ordiel


to peasom name jobHHle,habhies: etes
The paohlem Nith Passwoxd
bi91est isPebele
don Use stzons passuod

Bxude foace haicking Xegulse moxe patience o


SuccesSfully caack a Pass waxd

Thexe aaevaaibus ypes of baute foace attaik

Simple Baute foace _Altack:-Jt ocua when attacker


UesS vict im lbsio caedendial monually nidhou
any S6ffuOxe
2 Many peoplg Si111USe weak Posswozd ke
passhioad 12 94 0a 1224 e-tcfoz all web eIcOuniS

Dicionaxy altaki-aH achei aunnina thaaush


didiona xy Waads
Page No.
Date

cetack: +iscombiidionof-
Bauefoa
foste
Baule attatk and didionaay atack
Hybaid foace
simPleBaute iHh chaxacdea leHea dndJ
A-
Atackex expeament

umbex combir
x
find caasec passwogd
comblnatlon_to

attackea begin the


ce 8aute foaceattack
posswoad Use thet pass rvand
ithith knanwn
lictand milians
Paocess lo3in aedintialsusi09
fo Matchin
afUseaname

Atcicke colletUsesname
lentlal Slucrinai
Saeclen that hey stalen vhich Hhey es
Passwoac whelhex they 9e
0 onthos webs ite to check
access
his appaoch s
sucdess fulli
o
multple acmsun
fexson Put
usez0a me Possnvaac
Some

How to Stolen o 2ecove faom Bautefoare


atack:
i seloaae wiih combin
lenstbi Passuaad
cha
O leltex numbe&,alphanumeaic oSpecia)

Do Not USe Same Possvyo on Mutile


accouDtS
Page No.
Date

1:3h1 piggybocking
piagybacking Xefeas
o saining
ins Comgu
aces
by baina)ha
to wixelessinteaneti connection
connectlon tho e
within Sanse Of viaeless
subscalbex Peamission
the Seavice without
someone s
pigybackingis atuallyNhen its
ctlons nith anothez peason
who s authaxize

to Idintenday inta 2esiaided'


dxes

pinyback attack speclfically whee an


is
A
attakez 1ain aues5 to Sytem using anothez
Useas_cannedion-VMhen aLdhaäsed use notUsin a
theiacaunti

ThiS can happen in_Seveaa Waysincludin


pi31ybaikins public wiseless ntw e pis2yhachin

intoPasáwoad:pxotected sysem

following may be situatlen yhen we taied


Piiaybacking
May begdináccess af available Nfl Dlw
May be steal eleetaiciky faom Someone
else connedian
3 jsinswiflhatspot of nedsbyi neishibour-
Nho nevex set up possuwozd Fosocess
Pago No.
Dato

aon foxP193ybacking
eeason
ee.
he
TheeUSualPUspose of
Faee netw
Pia3ybacking
a.cess aathes than an:
s
iiousLntent

toPI99ybackins
Hor
1 Tt is e
simple to access an
eless
nlw- Al We hove todo et into unsecue
the

en
wi-Fhotspot
geof nlw-fzom sianaloo sel ect ou
a Hon that
x
ehoasen Paesent
Po
choas
Posswoad Paotected e
may guess the
asswoddsusins above attack.
oasSWOšdS

Ho tofaotectPi99ybackin 2
To Paotect pigaybocking be ensuaethat
encaypthonis enabled-in
UgeWiaeless Encayptlon paotocal (wEP),

f thad s the optlon


possi ble use w1delesspaotocol AccessCwpA)

0aWpA2
Se staons fassWoxdFoa OUx encxypltan key,
ontainin9 14 chaxacdex Combln cHlan of lether

Numbex etc

Whese to pí34y backins OCCuswi


people have accessing hotgpat faom outsde
businesS Such as cofee 6hoppaovide free
WEtocustomex use
Poge No.
Date

Eei
Shouldex entEing:
23-2 is technique to
ed toobt
Used to
ab+ai
ain
numhe
Shouldex
snitfins

such_as pex5onal
identific
data by
hy
lookfna
looktn
IN
Infoamatian data
and athex contidential
Passwoaxd
Ovex Vicdim shauldex

P
Pass ue
IF P essona
ony Rss wesd 0v
e
Pin MYh
le hat tim
ePH
Pa hiddenly See

Peason1 data)

woad Is Shnding
0ne Wayof ShealngthePass
an ond note +he Pos5weard
behind individual
While he/she yping
it-1

Shouldea Sniffing esily dene-n caOwela


A place.

7 Do nat Naite Passwaad on disk oxPaPer

fe Nays Ho paeyent shoulder snFEing


n nexttO US
T the scacen awaay faom pesso
óN
devicesz
USePalvacyscaeen
StopP enteaing pin oo possuload cao wdeln
ed like icllspdat tafeshodely4xain ec
Pago No.
Date

Diving
3
3:3
Dumpstex
divingefeaJo act of
pctex ol
litexall:

aTaash_dump9teg and
Dumpstea Seaachins
in iDs
inslde
lon that could benefitto hack.es
climb
foamaion
foinfoamoalo
heaa ghe atack on conmPutex
h,
when
means Seaaching usefu
Dumpstex divin9
nfoa maion- sayA9 hat one man daash is
fomouS
fo one peasonn
The
nt hea mon
taeasuaethat means
anothea migh be bish} value to ancihe
es oatblesS

.
0 sid
consid
Dsivps occua 2
why pumpstea
fmoiloddaessber oCosry aut Vishin9
2phone num
and
3:Poss woxd Pin that we aish naite an
stick notefoa conyinedAce.
Bank sademenisS-
SMedica seCord

measuae fox Dumpse x Diving 2


:
PxeYenting
Destaoy any CD]DvD cantain Peasonal
data.
2 Tn Cose no longexneed OuxPc, make suze We
hoVedeleted all data so that itcon't be xeco vered
3USe iaewall 4o Paotect faom unaudtox ized acdiYk.
Comnle should lock cwaste bins should
havesafedispaSal poliay
Page No.

Date

22 Biometaic t

bia meang
The biameai
ife and
deaiv edl
metaiic
taom 6deek
means measuae

Biamelaicis sciente foa dcheaminepeasons


by measuaingits physiolosical chozcceaistirs.
Jtanalyze hum.an bady choaacteaistics
.
Suth
asDNA finseapainteye aeina,iais, Vole Palten
facial paHean hond measuàment fox authentin

method mostly have tuo basir mode


Biometaic
yealficaion mode : Jdentificotlan tode

Vezificaticn Coauthendiemode-
)Syslem feafoam one lo Ane conPaaision of move
Cx adion mptuaed with_ Spefic templateand Stoxed
In biomelai dahbase in aades to vealEy the îndividua
15 Pexson they claimto be

Thxee Steps invalve in the Vealficadian of Person

In fiast step aefeaence modes Foa all Hhe useas


ade enexdted and stoxed in the madel daabase-
In Second step, Some samples axemalch.ec
Nith àefexen.cemodel ta enexate the 9enuine
and Impastes Stoae colculate thxeshald
Page No.
Date

is leslin9 step The paocess m.ay Use a


xd step îndicale which demplate
3
Thiacoad ID,
sma be_ug
be
PIN
ed fos compaaision
shauld

giemPeafoam one omany Compoaislon


mode:-
entificati
heSyg1em
Tder
base in adlemp to
a blometà ic data
4+ Of unknown individual.
lish
a3ain
estab.
icdendlEy

Blome-i Sysem:
A1Invantageof
caease Seciaity
faaud
Reduce causeel by fogaat id
4 Eliminade poblem
Passwoad

Disadvankie of Biomeaic
Fox people affeckec ith dlabeiLHhe eyes
4e affectdeel xesulling n
_diffegen.ces
2 THfound thct voice af peaple It may change
duaingthaoat Infection_oa too
much èxieana
enviaenmental noise Thexefoae eaificatian is
not woakable all time
finseapaint may be affectes Jue 4o some
conditlons
Page No.
Date

23 Types of Biomedaics

R21LEye-iaia Recognition-

Eye las s cela sed Paatof thee


he coanes andSuaaounds ihe Pupil eyeebind
A peasansals pallean is uni9ue
xemain unchanaed thdoushautlIFe
2Taisis well paatecied because itis
by coanea So it is used fox_hlomeiaic authenti
authentin
Retina

PuPi

iaispalean isdffexen Tox each eyeoof


Sinalepeasoen

Mchans m oF lals aecaanitlo n


1Eiast the location af Pupll isdetected
Folloedhydeiedion of iaisand cyelids
:Unnecesaay pazt Such.as eyelids_anc
eyelashes_axe excluded faom Clip and only
1aispatlean is Considead
3 1a Patean is divded into feaduxe value
toquanttfy tmage
4 cdchina is hen pesfoa10ed wi+h feod yat dats

Paeviousy etaacte in,Same methed


Page No.
Date

1oo)olo
1oololo totR1ol
loloo

into Conves Pexfoam


hotosafh/ Out DIvide
cliP into Mahins
he a
blocks
1S feadugevalue

Mecha nism fos ais Rero gn|2


Arplic
Passpoat asency Tntesnalion.al alaposiaadho
Passpoat
cetex

Kecosn itiLon
Ketina

The Pa1iexn aF bload vessels efrmate


emanade fzamaptic neave and dispease +haoughout
change
JheXetina depends on individuals oe nevea
twin
NoNo setind Same even dentical
Retina aecoanition technoloiy ca putuaes
yesselson
and analyzes the pattean Af blood
the thin nezve on he back of eyehall that

PaAcess ligh+ eteain9thaough


the pupil
AHhough
Stable avex peasons lfetime,

by 5uhas 91ucoma, diabeic


+
each paltean nazmally 3emain
Can be affeted
blaod paessuae
Relina Recoanizn jg most se(uxe method
Page No
Oiate

FaceRerasnidton

acic &ecolnition S Way of


aetom12n
thaoush 1echnalogy
a buman face
A acial aecognitlon System_Uses bLormel
a aa
featuaes faom Photogaoph a Videfo
Map facial
Jcompoaesheinfoamaionhithadan
d

Of knan faces to fiod a


match.
How faclal aetain1t1en Woxk 2
Step1 A Plctuae ls captu aed taom otoox
Phooo
vide,

youa inmo9e m.ay shaN yauookin 9 Sfaaigh ahead

Sep2 Faclalaecoan1Hion S0ftwaaeaeos he


eamelay of face key factorinclude hediri
the
distan

belween youd eyeS apd dlsanae faom Foreh


hta
tochin

SHeP3youafaclal S19maduae -a mathemcdca mu


Js_comPaaed to database of knonn faces

Step4 A delezminalion is made youx Tacepaint

malch with imase intaclal aecagniz" sysim

Arpli aiapoxts, Mabile phone, colleses Aaclol


mdia Reloileas Maakelexs
Page No.
Date

Recognlilonz
in3eapaint

ase
wo sepaaleStages involNed inusin 1
Theae Recogn Hion
eapaintRenaollment uaing enxallment each
is
fiast io9expaint
psint Sconhed.Onalyed ond then
tnSex
asonsin Coded taam a Secuaedatabase.
the Sysiem is
is camplele
gH0
Stoded enaoll ment
0nceto use andtbis 1Secnrdstaae knonn as
eady
yeanticatian-
AmuO0e nho Nanis toain access_ has toput
AnyONe on q annex Scannes take fingeapain
the
fingea
a401nst all paiHS In dalabase stoaedduaing
etk 09ains decide whehea pea son sain access
lment and
enaollr
as nminutie
The 2idae endins ls knon distance andansle
The Compudex measuae the to uan
etween
between
ethem
th
o
an
OndUse algodiihm
UDigue Dumbes Code:
his lD-Foa m.aion
FinseaRaintMay tieet o ue to aome inNury
school collese etc
APrlic 03inlz

eometay Recosnitlon:-
_Hond

Hand 4eomelayisan Qudhentltatian echn


Ses the geomelaic shape_af
hondta idenH1f_Usex

Thetechnigue woak by measuàina


andanalyzing the shape and physicaleaHuxe a
as Length wiath palm_
seas hOnd Such finses
Page No.

|Dato

ike 140Uses
fingeapainttbis technique also u
To and
ead
înHiate he
device
all usea's hand. 3e
nands adey
si axe
measuaed and satistics_axe stored
e
e
in database fos futuxe aerosnitlan
To acdivate the sysdem uses places_al.
on suafare a-f eo
aeadex on
his hex hand
2 Readex usually bave fectuses nd uid
andgut
uid the
the
USeas hand on suxfase
Hand featuxes axe stoxed ondatabase
Use itfoz fuathea identificPae cess

2-2-16 Sianatuae Recasntion:

Sisnatuae aecognition is exampleof hehavin


hehavioo
biometaic tha- identifies a
feasan bosed ontheix
hand naiting
TCanopeaaed in tuodHlexent Waye
ays
Static Inthis madeUsex Waite sisnatuge on on
Popeo and ofles hNaiting Camplee itisdiHsel
haough' Comeaaetuan the 's1gnatu2e ima3e inls
hits
The biomelaicSystem then aecasnizesthe
S13hatuze analyzing 1ts shape

DynamicIn this medeUse iaite theia signatur


on dabletr Heae usex sisn usinginsex
Dynamic infoam uSualy fallowina infasm
Spitial efrooadinate.X(t)
Spitalcaosdinateytt)
pxessuxe nhite wsite pct)iocination pendownj
Page No.
Date

Ke
RecosinHion- decosntion is cafabiln of-
Hing HandnaHina
HandnaHir
aili aanslade ax IntesPaet human bandwsiina
Hotaans _difesenE nay Such os
nd displayin
waites aneleclaonic
o
chasactea
documetIaaph
documen4 e
Recoaintion
os
When usex
electaanic pen oa mouse
2online uch
Suc
indeatace

Recoanition
VaiceSPeakex
5yem by medGuain9
a
aecognHion
yoice
O xson's Speech oS aix is expelled
the chaaadexslics aaynx and aut thaoush
Sh theia lun95, ocaosS-the
thaoush and moulhb
heia noSe Softuaae ill Com paxe thbe
2 SPeech Yeaific
eaistics
alaeady Stoaedonsee
data
uo vairepaints axesufflcieniSimilaz,he
declaae as match
biamelie

certigity SystemwllShem

voiceaeco9nHion used os Amazan Alexa, Apple


Siai M(aosofts coadano to
etonilion System_en ahle consumex
Volce
intexact with+echnolosy simplyby speaking
oit
enablins hand aee xequest emind es gnd ather

SimpleHosk

Ha voire RecoanHion woaks?


zecosnHion Slw an campute
aequlae
vaice
that analasaudio is canyesi to disit.ol sinanal
Usins Analas todisita convexier
Pago No.
Date

Ho decipher àsisnal,it
2
have
foz
a
a Compudes adatabose
sua
disiial
oa
imusk
Voobuloay .
as hellas speedy mea Ds od compadin2 thissd.
dad
The speeh PaHean aae soxcd
on
tosiindls
haad daive ond loaded ino memoay When4he
15 &un
check hese StoaedatexD
A_ Compaaaoa
poattean

A/D Canveadex an_ adionalle


a301
heoulput of
Palean deaanHion.
PaOcessing speed is aitial
Advantaaes:

) populaxandlov Co.st

less Xequiaementufoa usexsdonoti


Sepxatepåoress fox VeaifI
but less.acCuade
need

Recosnihon=
11 Keystaoke

KecoJn Hiondescaibe exactly en


keystaoke
each ey was Paessed and When IE
nyas releqs

nspeason 1s typingat computex keyba.cxd

The key.staoke ahyhms of a usea 1smea Suxed


lo develop uniguer biom.etxic template of useas

Hyping partean Fa futuae adhentic.

Advantase o keystsoke
decasnHlen
keystaak dynamic is cast effective paoeduue
J does_not Xequixe an additional hluonly keyboor.d
and su to canizat keystaakxes
Page No.
Date

Setupdnd taa iningnotaequiose


easyt
use o
inteanetr
o Use use
Bwithoul Keystaoke Reca9nHion:
yantose
low ex
pisadvan a Faam Aimeto lime
in tyPins Style useg inúured
change may vaay When
3 pi'ng Speed
TYP

Acces
4 Cont3ol:=Access Contsol is method af 9uaaenteeing
and +hey have
have-
aze whofhey sayheyaae
JCexs
access to Company data:
aiale
he
the apPa
apPaaPai

of accessconaal:- to
azeHwoyPes conaol limHs access
Thexe ph aesS
1Physical:buildin4/30om.s
campuses,
limits caneetions to
access cantaal
2Loaical-losical
nethadk SystemEilescPdata
Compudea

Authenticatian- the
Authentiroadion
is the paotess OF Validina
ldenHity of Sameane ox Some-thing: an
Authenticalian is actof paovins
of com puder SysteM usex
identity
checkins to
see if a usexs
Audhentiadian
malch dhe_aedential
in database
Caedentla
Date

in aii
used
theae axe thsee methods Ta passharJ
Geneaaly
you-knon (egVsea
Somelhing-
Have LEJ Lockkey)
Somethios-you-
Abaud you
gingeapait
3 Something

R311 Authetication Mechanism*

Authenticatlan Methods Hechnolo11ps used fox


6eneaally folloing
Puaposee
duthentlcation
Sinale siini an
authenticatlon
Remate Uses AcesS ancl

1 What is Sinale sign an


Sinale Sign anls abillty Of usex toerder
o fassnaxd to loain to mullhele
HheSame:id
dpplications
ithin an eneapais.e
have accaunt
FaxexampleSupPose Usez
l09into
on eagle-hen Helshe Succesflly
mail accaunt hen Sea nevea aequlaed to sisnin
daiye account ajaln

Smait-tom
5enamc)
FossieeD

authettcateel
Use
CaSe:-once, usez lo9in to gmall fom
Pago No.
Dat

vithout VPN hackes


wit
6e. aduae

( Intesne+

our JP addaeSS

8
JPadd&ess 82-12980 11
A
Uses
8o-1|I
igwihoud vpN
82-199

VPN VPS client


Casez

Youa
IP hackeY
ss
addaes
82-129
8oIT Adwaxee
AD
Paovides
Seavice
Tnteanet

A Cyoua VpNta0ffic
Passes thaOUJ h

Youa TSP but 14's encaylecE


So youa TSP Cant see it

spies ok Snaops.

VPN sesvexA
Tntease

fouz new Tpat


44]3o
77:234,
Page No.

.
Date

236A Pollcies
Polices in
Secuaity aae high level
eve ud
which deleamines haw accesS axe Contaolled andlines
actess décislon aaedeleamined

Thaee acess colaol OxInize haw Peol ain


access 0ae i)RoleBased Access contaol (RBAC)
i)Discaetionaay Access Coniaal OAC
iii)Mondatoay Access Contaal( mAC

361Discaetionasy Access copdaol (DAC)=

A discaelionaayAccess contao Systern is


a Syslem in which a
used with ccess a to aceatain
level oF dala can aiveacess -to the Same level
ofdala to soméone else hase d on theix dudseme
and choice

ThisPaocess make flew of data much ea sler


nd lot mose uses.aiendly -han any olhex Sysien
exanmpl e;>
Suppose usex Ahave Peamission to
3ead only a:tXtAlle,So Usex A cannot Walle or
execule the flile

peamission
7AFLex some lme UsexA niant
fox a4xt File then
o
sea A can
ite

Chanit
Seting by olngo Secualtytab of File
Page N0.
Date

Case Uses A need


waiie pesmi5Sio

a+Xt
Reod peamis1on 1schana
peamisslan
Not allowed permission bySotopaopeal1
RExecute i menuand secualty

Waite Atab addallow


wale Pesmis slon

Contaal:
642 Kale BasedAccess

Role Based AcessconHaol(RBAO is melhod a


f aestxidina netwaak accesS hased
an the aale
Ofindividual Useg wthin enteapalse-

RBAc ensude that An employee aole In


0asni2aion deleamines_he Peamission tha
indiuidual is saaed and ensuxe }hat lowe

level e Mplay ees Can occess Sens1}ive infosm


x peafoxm hi3h level task
Means Nos mal employee 9aoup iothe
OAIN12 e Cannet access the data af fay aol
System ofoa1nizadlon 9xauP
2368Mandatoay Access (ntaol (MAC:
MAC defined by System adminls
Caiteaia adminit
nist
Staictly enfoaed by apexatins systenm(as)aa
Seausity keanel and aae unable
to be aHes
end usexs?

employee in saveament and milleay fai


Used AC Peliey

MAC contaal woak byassignina classif.n

label to each le Sysem ablect-


classiticattan indude confidetial.Seeset.dan
Secaet
Each usea and device on system Is asSssisne
similax classiti and cleaaeance level
whep a pexson ox device taies to access a
Speciflc aesaudee,theas,doaSecuaity
keanel il
check eniity caendential da deleamine whether
a CCess will adntel

You might also like