Page 80 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 80

Information  Security and Privacy




                    Notes          6.1.1 Access Control  Objectives

                                   The primary objective of access control is to preserve and protect the confidentiality, integrity,
                                   and availability of information, systems, and resources. Many people confuse confidentiality
                                   with integrity. Confidentiality refers to the assurance that only authorized individuals are able
                                   to view and access data and systems.

                                   Integrity  refers  to  protecting  the  data  from  unauthorized  modification.  You  can  have
                                   confidentiality without integrity and vice versa. It’s important that only the right people have
                                   access to the data, but it’s also important that the data is the right data, and not data that have
                                   been modified either accidentally or on purpose.
                                   Availability is certainly less confusing than confidentiality or integrity. While data and resources
                                   need to be secure, they also need to be accessible and available in a timely manner. If you have
                                   to open 10 locked safes to obtain a piece of data, the data is not very available in a timely fashion.
                                   While availability may seem obvious, it is important to acknowledge that it is a goal so that
                                   security is not overdone to the point where the data is of no use to anyone.

                                   Self Assessment

                                   Fill in the blanks:

                                   1.  ......................... is the process by which users are identified and granted certain privileges
                                       to information, systems, or resources.
                                   2.  ......................... refers to protecting the data from unauthorized modification.

                                   3.  ......................... refers to the assurance that only authorized individuals are able to view
                                       and access data and systems.

                                   6.2 User Identification and Authentication

                                   Authentication is any process by which you verify that someone is who they claim they are. This
                                   usually involves a username and a password, but can include any other method of demonstrating
                                   identity, such as a smart card, retina scan, voice recognition, or fingerprints. Authentication is
                                   equivalent to showing your drivers license at the ticket counter at the airport.
                                   Authorization is finding out if the person, once identified, is permitted to have the resource.
                                   This is usually determined by finding out if that person is a part of a particular group, if that
                                   person  has paid admission, or has a  particular level  of security clearance. Authorization is
                                   equivalent to checking the guest list at an exclusive party, or checking for your ticket when you
                                   go to the opera.

                                   Finally, access control is a much more general way of talking about controlling access to a web
                                   resource. Access can be granted or denied based on a wide variety of criteria, such as the network
                                   address of the client, the time of day, the phase of the moon, or the browser which the visitor is
                                   using.
                                   Access control is analogous to locking the gate at closing time, or only letting people onto the
                                   ride who are more than 48 inches  tall - its controlling entrance by some arbitrary  condition
                                   which may or may not have anything to do with the attributes of the particular visitor.

                                   Because these three techniques are so closely related in most real applications, it is difficult to
                                   talk about them separate from one another. In particular, authentication and authorization are,
                                   in most actual implementations, inextricable.






          74                                LOVELY PROFESSIONAL UNIVERSITY
   75   76   77   78   79   80   81   82   83   84   85