TAILIEUCHUNG - ACCESS CONTROL

“Access control includes authentication, authorization and audit. It also includes measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems.” -- Wikipedia | ACCESS CONTROL William Newton wnewto1@ May 2, 2007 University of Maryland, Baltimore County What is access control? “Access control includes authentication, authorization and audit. It also includes measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems.” -- Wikipedia What is access control? Something you know Passwords “Perfect Passwords” by M. Burnett & D. Kleiman Something you are Fingerprint, Iris, Face Something you have Token, RFID, Key Something you know Passwords Most passwords can be guessed or cracked Password policies frustrate users. Administrators give users a default password U2n*9kh! Passwords that follow company procedures are hard to remember .or are they? Be creative! Categorize your passwords Consider a policy that requires a 15 character password with a character from each character set: Something you are Biometrics False positives – bad guy positively identified as a good guy False negatives – good guy is not recognized at all Fingerprint technology becoming a standard feature. Something you have Physical Token Radio Frequency Identification (RFID) RFID Implants Problem: Physical security and Replay Attacks Shmoocon 2006 – Adam Laurie: “RFIDiots” Access Control Approaches Discretionary Access Control (DAC) Mandatory Access Control (MAC) Context-Based Access Control (CBAC) Role-Based Access Control (RBAC) Lattice-Based Access Control (LBAC) Discretionary Access Control Restrict access to objects based on the owner of the objects Bob owner of Bob can grant read privileges to Alice to . Security Concern – Buffer Overflow attack to spawn a shell with root privileges Mandatory Access Control Restrict access to an object based on the classification of the object. Policy restricts access Various levels of control Disallow programs to open sockets Render “root” .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.