Overview
In this first unit, we will explore mechanism and technologies that allow us to control access to resources in our IT infrastructure. We will discuss various authentication and authorization protocols, and where each might be appropriate. In addition, we will discuss the importance of enterprise authentication and authorization for both users and devices, as well as newer technologies such as OAuth and SAML which allow authentication both within and between desperate organizations.
According to the (ISC)2 Common Body of Knowledge (CBK), access controls are described as:
- File permissions, such as “create”, “read”, “edit” or “delete” on a file server
- Program permissions, such as the right to execute a program
- Data rights, such as the right to retrieve or update information in a database
The topics in this unit include:
- Identifications and Authentication
- Centralized Access Control
- Decentralized Access Control
- Access Provisioning Life Cycle
- Access Control Attacks
- Testing Access Controls
In this unit, plan to:
- Read: pages 37-67 in the Network Security text
- Read: pages 109-125 in the Security Essentials text
- Complete: this week’s written assignment
- Begin: this week’s practical assignment
- Participate: in the weekly discussion forum
- Prepare: for the Case Study Review
Written Assignment
Practical Assignment