Skip to content

Next Security Page

Principles of access controls, the terminologies and the different models

3

Separation of Dudies

Need-to-know

Principal of least privilege

Access Control Models

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

Role-based Access Control (RBAC)

Rule-based Access Control (RB-RBAC)

Example of MAC – Bell-LaPadula BLM – Confidentiality

read-down, write-up

no read up, no write down

Biba Integrity model is exact opposite of BLM

RBAC Implementation: Just Enough Administration (JEA)

Windows Admin Center (WAC)

www.securityintelligence.com

encryption symmetric and asymmetric

Symmetric – is a single key for encrypt and decrypt – good for large amounts of data

hashing

PKI

Data Encryption Standard (DES) – Symmetric its weak and

Advanced Encryptoin Standard – symmetric

RC symmetric

DSA – Digital Signatures Algorithm

RSA – Rivest-Shamir-Adleman – Asymetric

Firewall Ports, Protocols, Programs, IP Addresses

KFSensor honeypot

S/MIME v3 and OpenPGP

Spot 4

Network perimeter

packet filtering firewall

NG IFrewall

Deep Packet Inspection DPI

Encrypted traffic inspection

QoS

Threat intell

IDS IPS

Advanced threat protection

app control

av inspection