Principles of access controls, the terminologies and the different models
3
Separation of Dudies
Need-to-know
Principal of least privilege
Access Control Models
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role-based Access Control (RBAC)
Rule-based Access Control (RB-RBAC)
Example of MAC – Bell-LaPadula BLM – Confidentiality
read-down, write-up
no read up, no write down
Biba Integrity model is exact opposite of BLM
RBAC Implementation: Just Enough Administration (JEA)
Windows Admin Center (WAC)
www.securityintelligence.com
encryption symmetric and asymmetric
Symmetric – is a single key for encrypt and decrypt – good for large amounts of data
hashing
PKI
Data Encryption Standard (DES) – Symmetric its weak and
Advanced Encryptoin Standard – symmetric
RC symmetric
DSA – Digital Signatures Algorithm
RSA – Rivest-Shamir-Adleman – Asymetric
Firewall Ports, Protocols, Programs, IP Addresses
KFSensor honeypot
S/MIME v3 and OpenPGP
Spot 4
Network perimeter
packet filtering firewall
NG IFrewall
Deep Packet Inspection DPI
Encrypted traffic inspection
QoS
Threat intell
IDS IPS
Advanced threat protection
app control
av inspection