• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2023 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

Boyle and Panko Chapter 5 Access Control

January 1, 2022 by Jose Gomez 2 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 5a - Access Control Tagged With:

Reader Interactions

Comments

  1. Chenhao Zhang says

    March 1, 2024 at 8:40 pm

    Access Control Model: Different Access Control models are introduced, such as DAC (discretionary Access Control), MAC (mandatory Access Control), and RBAC (role-based Access Control). Dacs allow resource owners to grant or deny access to other users, while MACs enforce strict security policies based on predefined security attributes. RBAC focuses on roles and responsibilities, assigning permissions to roles, and then assigning users to those roles.
    Access Control Principles: This chapter discusses the principles of access control, including the principle of least permission, which states that users should be granted the minimum permissions necessary to perform their tasks. It also covers the principle of separation of duties, which aims to prevent fraud by ensuring that no one individual has complete control over a critical task.
    Authentication and authorization: Access control is closely related to authentication and authorization mechanisms. This chapter explains the importance of verifying a user’s identity (authentication) and determining whether the user has the permissions (authorization) needed to access a particular resource.
    Access control Lists and functions: This chapter introduces access control lists and functions as mechanisms for implementing access control. An acl is a list of permissions associated with resources, specifying which users or groups can access resources and their associated permissions. A function, on the other hand, is an object that represents permissions granted to a process or user.
    Implementing Access Control: This chapter provides guidance for implementing access control mechanisms, including the selection of appropriate access control models, the design of secure authentication and authorization systems, and the management of access control lists and functions.

    Log in to Reply
  2. Yi Liu says

    March 3, 2024 at 6:33 pm

    Access control is a fundamental security concept that restricts access to resources in a computing environment. It ensures that only authorized users, systems, or processes have the ability to perform certain actions on a system or network, such as reading, writing, or executing data or resources. Access control mechanisms are crucial for maintaining the confidentiality, integrity, and availability of data in information systems.
    1、Types of Access Control:
    (1)Discretionary Access Control (DAC): In DAC systems, the access rights are determined by the owner of the resources. The owner decides who is allowed to access and modify their files and programs. (2)Mandatory Access Control (MAC): MAC is a more stringent model where access rights are governed by a central authority based on different levels of security clearance.
    2、Key Principles:
    (1)Least Privilege: Users should be given the minimum levels of access – or permissions – needed to perform their job functions. (2)Separation of Duties: This principle ensures that no single individual has the ability to execute critical tasks alone. It’s designed to prevent fraud and errors by dividing tasks among multiple people.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in