Page 54 - DCAP516_COMPUTER_SECURITY
P. 54
Computer Security Manmohan Sharma, Lovely Professional University
Notes Unit 5: Access Control Mechanism
CONTENTS
Objectives
Introduction
5.1 Access Control Overview
5.2 Access Control Objectives
5.3 Access Control Lists
5.4 Abbreviations used in Access Control Lists
5.5 Creation and Maintenance of Access Control Lists
5.6 Revocation of Rights
5.7 Ring based Access Control
5.8 Propagated Access Control Lists
5.9 Summary
5.10 Keywords
5.11 Review Questions
5.12 Further Readings
Objectives
After studying this unit, you will be able to:
Understand the meaning and importance of access control
Discuss the various objectives of access control
Gain knowledge of access control list
Learn about various abbreviations used in ACL
Analyze the process of creation and maintenance of ACL
Describe the concept of ring based access control and propagated access control lists
Introduction
The meaning of access control has changed over the last several years. Originally, access control
usually referred to restricting physical access to a facility, building or room to authorized
persons. This used to be enforced mainly through a physical security guard. Then, with the
advent of electronic devices, access control has evolved into the use of physical card access
systems of a wide variety including biometric activated devices.
As computers evolved the meaning of access control began to change. Initially “access control
lists” evolved specifying the user identities and the privileges granted to them in order to access
a network operating system or an application.
48 LOVELY PROFESSIONAL UNIVERSITY