Chương 3: autheniation & access control | Tài liệu môn an toàn thông tin Trường đại học sư phạm kỹ thuật TP. Hồ Chí Minh

I. Authenication:  True Positive;  True Negative;  False Positive;  False Negative- Goal:- Types (Kieu); + ST you know: Password,...+ ST you have: CCCD, Banking Card,..+ ST you are: Dau van tay, mong mat,... @@ Factors (Nhan to) Single-factor authentication Two-factor authentication. Tài liệu giúp bạn tham khảo, ôn tập và đạt kết quả cao. Mời bạn đọc đón xem!

CHƯƠNG 3: AUTHENIATION & ACCESS CONTROL
I. Authenication:
True Positive
True Negative
False Positive
False Negative
- Goal:
- Types (Kieu)
+ ST you know: Password,...
+ ST you have: CCCD, Banking Card,..
+ ST you are: Dau van tay, mong mat,...
@@ Factors (Nhan to)
Single-factor authentication
Two-factor authentication
@@ Trusted Path
The path connecting you and the TCB
Trusted path is provided by
The OS
Or
The combination of hardware and OS
Example:
Ctrl – Alt –Del
Keyboard + Display + OS Trusted path
@@ Password Authentication (Xac thuc bang mk)
@@ Implementing Password Authentication
2. Access control
@@ Principle
@@ Requirement
•Reliable input: a mechanism to authenticate
• Fine and coarse specifications: regulate access at
varying levels (e.g., an attribute or entire DB)
• Least privilege: min authorization to do its work
Administrative policies: who can add, delete, modify
rules
II. Access control
1. Principle:
2. Requirements:
- Reliable input
- Fine and coarse specifications
- Least privilege: ( máy tính) , (AD) (trênDirectory service Active Directory
mạng)
Group policy objects: chính sách kiểm soát GPO
Ghép domain - > Cấp forest < ----cấp tree
- Administrative Policies:
Discretionary access control (DAC): based on the discretion of the data
owner.
• Mandatory access control (MAC): A system-wide access policy.
Hệ điều hành Unix: Selinux, solamis trustedDBS
• Role-based access control (RBAC): based on user roles. (GROUP)
• Rule-based access control: based on a set of predefined rules
An ninh Mỹ: Unclassified -> confidental -> secret -> top-secret ->
clearance -> secuinty
3. Access control Elements:
- Subject: Chủ đề: thực thể đó thể truy cập các đối tượng( user)
- Object: Đối tượng: truy cập- tài nguyên được kiểm soát ( c quyền), trên
file o đấy quyền o đấy
- Right
ACM
Duyệt theo:
- object: access control list ACL
- Subject: C-list
UNIX file access control
- Linux: Sticky bit: chỉ owner mới thể xóa....( only owner can remove,
delete….)
- Window: CREATOR OWNER
| 1/3

Preview text:

CHƯƠNG 3: AUTHENIATION & ACCESS CONTROL I. Authenication:  True Positive  True Negative  False Positive  False Negative - Goal: - Types (Kieu) + ST you know: Password,...
+ ST you have: CCCD, Banking Card,..
+ ST you are: Dau van tay, mong mat,... @@ Factors (Nhan to) Single-factor authentication Two-factor authentication @@ Trusted Path
The path connecting you and the TCB Trusted path is provided by The OS Or
The combination of hardware and OS Example: Ctrl – Alt –Del
Keyboard + Display + OS ➔ Trusted path
@@ Password Authentication (Xac thuc bang mk)
@@ Implementing Password Authentication 2. Access control @@ Principle @@ Requirement
•Reliable input: a mechanism to authenticate
• Fine and coarse specifications: regulate access at
varying levels (e.g., an attribute or entire DB)
• Least privilege: min authorization to do its work
• Administrative policies: who can add, delete, modify rules II. Access control 1. Principle: 2. Requirements: - Reliable input
- Fine and coarse specifications
- Least privilege: Directory service (
máy tính) , Active Directory (AD) (trên mạng)
Group policy objects: chính sách kiểm soát GPO
Ghép domain - > Cấp forest < ----cấp tree - Administrative Policies:
 Discretionary access control (DAC): based on the discretion of the data owner.
• Mandatory access control (MAC): A system-wide access policy.
Hệ điều hành Unix: Selinux, solamis trustedDBS
• Role-based access control (RBAC): based on user roles. (GROUP)
• Rule-based access control: based on a set of predefined rules
An ninh Mỹ: Unclassified -> confidental -> secret -> top-secret -> clearance -> secuinty 3. Access control Elements:
- Subject: Chủ đề: thực thể đó có thể truy cập các đối tượng( user)
- Object: Đối tượng: truy cập- tài nguyên được kiểm soát ( các quyền), trên
file nào đấy có quyền nào đấy - Right  ACM Duyệt theo:
- object: access control list ACL - Subject: C-list UNIX file access control
- Linux: Sticky bit: chỉ có owner mới có thể xóa....( only owner can remove, delete….) - Window: CREATOR OWNER