Page 54 - DCAP516_COMPUTER_SECURITY
P. 54

Computer Security                                             Manmohan Sharma, Lovely Professional University




                    Notes                         Unit 5: Access Control Mechanism


                                     CONTENTS
                                     Objectives
                                     Introduction

                                     5.1  Access Control Overview
                                     5.2  Access Control Objectives
                                     5.3  Access Control Lists

                                     5.4  Abbreviations used in Access Control Lists
                                     5.5  Creation and Maintenance of Access Control Lists
                                     5.6  Revocation of Rights
                                     5.7  Ring based Access Control
                                     5.8  Propagated Access Control Lists

                                     5.9  Summary
                                     5.10 Keywords
                                     5.11 Review Questions

                                     5.12 Further Readings
                                   Objectives


                                   After studying this unit, you will be able to:
                                       Understand the meaning and importance of access control
                                       Discuss the various objectives of access control

                                       Gain knowledge of access control list
                                       Learn about various abbreviations used in ACL
                                       Analyze the process of creation and maintenance of ACL

                                       Describe the concept of ring based access control and propagated access control lists
                                   Introduction


                                   The meaning of access control has changed over the last several years. Originally, access control
                                   usually referred to restricting physical access to a facility, building or room to authorized
                                   persons. This used to be enforced mainly through a physical security guard. Then, with the
                                   advent of electronic devices, access control has evolved into the use of physical card access
                                   systems of a wide variety including biometric activated devices.
                                   As computers evolved the meaning of access control began to change. Initially “access control
                                   lists” evolved specifying the user identities and the privileges granted to them in order to access
                                   a network operating system or an application.







          48                                LOVELY PROFESSIONAL UNIVERSITY
   49   50   51   52   53   54   55   56   57   58   59