• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

9/11 – Access Controls

Overview

In this first unit, we will explore mechanism and technologies that allow us to control access to resources in our IT infrastructure.  We will discuss various authentication and authorization protocols, and where each might be appropriate.  In addition, we will discuss the importance of enterprise authentication and authorization for both users and devices, as well as newer technologies such as OAuth and SAML which allow authentication both within and between desperate organizations.

According to the (ISC)2 Common Body of Knowledge (CBK), access controls are described as:

  • File permissions, such as “create”, “read”, “edit” or “delete” on a file server
  • Program permissions, such as the right to execute a program
  • Data rights, such as the right to retrieve or update information in a database

The topics in this unit include:

  • Identifications and Authentication
  • Centralized Access Control
  • Decentralized Access Control
  • Access Provisioning Life Cycle
  • Access Control Attacks
  • Testing Access Controls

 

In this unit, plan to:

  • Read: pages 37-67 in the Network Security text
  • Read: pages 109-125 in the Security Essentials text
  • Complete: this week’s written assignment
  • Begin: this week’s practical assignment
  • Participate: in the weekly discussion forum
  • Prepare: for the Case Study Review

 

Written Assignment

Practical Assignment

 

Case Study Review 

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in