14
Access Control / Authenticity Michael Sheppard 11/10/10

Access Control / Authenticity Michael Sheppard 11/10/10

Embed Size (px)

DESCRIPTION

Access Control Access to protected information must be restricted to people who are authorized to access the information. computer programs, and the computers that process the information. mechanisms be in place to control the access to protected information sophistication of the access control mechanisms should be in parity with the value of the information being protected the more sensitive or valuable the information the stronger the control mechanisms need to be.

Citation preview

Page 1: Access Control / Authenticity Michael Sheppard 11/10/10

Access Control / Authenticity

Michael Sheppard11/10/10

Page 2: Access Control / Authenticity Michael Sheppard 11/10/10

Authenticity

computing, e-business and information security necessary to ensure that the data, transactions,

communications or documents are genuine. important for authenticity to validate that both parties

involved are who they claim they are.

Page 3: Access Control / Authenticity Michael Sheppard 11/10/10

Access Control

Access to protected information must be restricted to people who are authorized to access the information.

computer programs, and the computers that process the information.

mechanisms be in place to control the access to protected information

sophistication of the access control mechanisms should be in parity with the value of the information being protected

the more sensitive or valuable the information the stronger the control mechanisms need to be.

Page 4: Access Control / Authenticity Michael Sheppard 11/10/10

Today

Username is the most common form of identification and the Password is the most common form of authentication

Usernames and passwords are slowly being replaced with more sophisticated authentication mechanisms.

Different computing systems are equipped with different kinds of access control mechanisms.

Page 5: Access Control / Authenticity Michael Sheppard 11/10/10

Access Control

Identification: claim of ID Authentication: varifying claim 3 types of info for ID:

Something you know Something you have Something you are

Page 6: Access Control / Authenticity Michael Sheppard 11/10/10

Somthing you know: include such things as a PIN, a password, or your mother's maiden name.

Page 7: Access Control / Authenticity Michael Sheppard 11/10/10

Access Control

Something you have: include a driver's license or a magnetic id card.

Page 8: Access Control / Authenticity Michael Sheppard 11/10/10

Something you are: include palm prints, finger prints, voice prints and retina scans.

(Two factor authentication)

Microlatch Fingerprint

Page 9: Access Control / Authenticity Michael Sheppard 11/10/10

Biometrics

Two Main Classes:Physioligical: relating to shaped of the body. Behavioral: relating to the behavior of a person.

Harder to steal biometric identity then forging a signature.

http://www.youtube.com/watch?v=Voygv1uTF7c

Page 10: Access Control / Authenticity Michael Sheppard 11/10/10

Authentication

After a person, program or computer has successfully been identified and authenticated then it must be determined what informational resources they are permitted to access and what actions they will be allowed to perform (run, view, create, delete, or change).

Authorization to access information and other computing services begins with administrative policies and procedures. The policies prescribe what information and computing services can be accessed, by whom, and under what conditions. The access control mechanisms are then configured to enforce these policies.

Page 11: Access Control / Authenticity Michael Sheppard 11/10/10

3 Types of Access Control

non-discretionary approach consolidates all access control under a centralized administration. It is usually based on the individuals function in the organization or the tasks the individual must perform.

discretionary approach gives the creator or owner of the information resource the ability to control access to those resources.

mandatory access control approach, access is granted or denied basing upon the security classification assigned to the information resource.

Page 12: Access Control / Authenticity Michael Sheppard 11/10/10

Policies and other security controls must be enforceable and upheld.

Effective policies ensure that people are held accountable for their actions.

All failed and successful authentication attempts must be logged, and all access to information must leave some type of audit trail.

Page 13: Access Control / Authenticity Michael Sheppard 11/10/10

Conclusion

Computer security authentication means verifying the identity of a user logging onto a network. Passwords, digital certificates, smart cards and biometrics can be used to prove the identity of the user to the network. Computer security authentication includes verifying message integrity, e-mail authentication and MAC (Message Authentication Code), checking the integrity of a transmitted message. There are human authentication, challenge-response authentication, password, digital signature, IP spoofing and biometrics.

Page 14: Access Control / Authenticity Michael Sheppard 11/10/10

Citations

http://ezinearticles.com/?Computer-Security-Authentication&id=354191

http://www.agiledata.org/essays/accessControl.html