Please enable JavaScript.
Coggle requires JavaScript to display documents.
Access Controls - Coggle Diagram
Access Controls
Threats to Access Control
Bypassing Security
Exploiting Hardware and Software
Eavesdropping by Observation
Reusing or Discarding Media
Gaining Physical Access
Electronic Eavesdropping
Intercepting Communication
Accessing Networks
Exploiting Applications
Formal Models of Access Control
Discretionary Access Control (DAC)
Operating Systems-Based DAC
New User Registration
Periodic Review
Access Control Method
Application-Based DAC
Permission Levels
Job-based, group-based, or role-based access control (RBAC)
Project based
User based
Task based
Mandatory Access Control (MAC)
Nondiscretionary Access Control
Rule-Based Access Control
Access Control Lists (ACLs)
Share Permissions
Security Permissions
Content-Dependent Access Controls
Constrained User Interface
Menus
Database Views
Physically Constrained User Interface
Encryption
Other Access Control Modules
Bell-LaPadula Model
Biba Integrity Model
Clark-Wilson Integrity Model
Brewer-Nash Integrity Model
Four-Part Access Control
Authorization
Accountability
Authentication
Policy Definition Phase
Identification
Policy Enforcement Phase
Effects of Access Control Violations
New legislation and regulations imposed on the organization
Bad publicity
Loss of business opportunities
More oversight
Loss of customer confidence
Financial penalties
Policies and Procedures or Accountability
Log Files
Monitoring and Reviewing
Data Retention, Media Disposal, and Compliance Requirements
Procedures
Security Controls
Media Disposal Requirements
Centralized and Decentralized Access Control
Types of AAA Servers
TACACS+ (Terminal Access Controller ACCESS Control System Plus)
DIAMETER
Base Protocol
Extensions
RADIUS (Remote Authentication Dial-In User Service)
SAML (Security Assertion Markup Language)
Decentralized Access Control
Privacy
Monitoring in The Workplace
Cloud Computing
Community Cloud
Public Cloud
Hybrid Cloud
Private Cloud
Two Types of Access Controls
Physical Access Control
Logical Access Controls
Deciding which users can log into a system
Monitoring what the user does in that system
Restraining or influencing the user's behavior on that system
The Security Kernel
Access Control Policies
Resources
Actions
Users
Relationships
Methods and Guidelines for Identification
Indentification Methods
Identification Guidelines
Processes and Requirements for Authentication
Authentication Types
Characteristics
Action/Performance
Ownership
Synchronous Tokens
Asynchronous Tokens
Authentication by Characteristics/Biometrics
Static
Dynamic
Concerns Surrounding Biometrics
Accuracy
Acceptability
Reaction Time
Types of Biometrics
Fingerprint
Palm Print
Hand Geometry
Vein Analysis
Retina Scan
Iris Scan
Facial Recognition
Voice Pattern
Keystroke Dynamics
Signature Dynamics
Gait Analysis
Authentication by Location
Authentication by Action
Single Sign-On
Advantages and Disadvantages of SSO
Behavior
Location
Knowledge
Password Account Policies
Passphrase Usage
Account Lockout Policies
Audit Logon Events
Relationship
Authorization Policies
Effects of Breaches in Access Control
Credential and Permissions Management