Skip to content

Next Security Page

Principles of access controls, the terminologies and the different models


Separation of Dudies


Principal of least privilege

Access Control Models

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

Role-based Access Control (RBAC)

Rule-based Access Control (RB-RBAC)

Example of MAC – Bell-LaPadula BLM – Confidentiality

read-down, write-up

no read up, no write down

Biba Integrity model is exact opposite of BLM

RBAC Implementation: Just Enough Administration (JEA)

Windows Admin Center (WAC)

encryption symmetric and asymmetric

Symmetric – is a single key for encrypt and decrypt – good for large amounts of data



Data Encryption Standard (DES) – Symmetric its weak and

Advanced Encryptoin Standard – symmetric

RC symmetric

DSA – Digital Signatures Algorithm

RSA – Rivest-Shamir-Adleman – Asymetric

Firewall Ports, Protocols, Programs, IP Addresses

KFSensor honeypot

S/MIME v3 and OpenPGP

Spot 4

Network perimeter

packet filtering firewall

NG IFrewall

Deep Packet Inspection DPI

Encrypted traffic inspection


Threat intell


Advanced threat protection

app control

av inspection