COURSE CODE: IT311 - Information Assurance and Security: Authentication
COURSE CODE: IT311 - Information Assurance and Security: Authentication
Security
Module 5
Introduction
Technical controls are essential to a well-planned information security
program, particularly to enforce policy for the many IT functions that are not
under direct human control. Networks and computer systems make millions of
COURSE MODULE
decisions every second and operate in ways and at speeds that people
cannot control in real time. Technical control solutions, properly implemented,
can improve an organization’s ability to balance the often conflicting
objectives of making information readily and widely available and of
preserving the information’s confidentiality and integrity. This chapter, along
with Chapters 7 and 8, describes how many of the more common technical
control solutions function, and also explains how they fit into the physical
design of an information security program. Students who want to acquire
expertise on the configuration and maintenance of technology-based
control systems will require additional education and usually specialized
training in these areas.
Topic – Authentication
Access control is the method by which systems determine whether and how
to admit a user into a trusted area of the organization—that is, information
systems, restricted areas such as computer rooms, and the entire physical
location. Access control is achieved by means of a combination of policies,
programs, and technologies. Access controls can be mandatory,
nondiscretionary, or discretionary.
Mandatory access controls (MACs) use data classification schemes; they give
users and data owners limited control over access to information resources. In
a data classification scheme, each collection of information is rated, and
each user is rated to specify the level of information that user may access.
These ratings are often referred to as sensitivity levels, and they indicate the
level of confidentiality the information requires. A variation of this form of
access control is called lattice-based access control, in which users are
assigned a matrix of authorizations for particular areas of access.
The level of authorization may vary between levels, depending on the
classification authorizations individuals possess for each group of information
or resources. The lattice structure contains subjects and objects, and the
boundaries associated with each pair are demarcated. Lattice-based control
specifies the level of access each subject has to each object. With this type of
control, the column of attributes associated with a particular object (such as a
printer) is referred to as an access control list (ACL). The row of attributes
associated with a particular subject (such as a user) is referred to as a
capabilities table. Nondiscretionary controls are a strictly-enforced version of
MACs that are managed by a central authority in the organization and can be
based on an individual’s role—role-based controls—or a specified set of tasks
COURSE MODULE
Identification
Authentication
Authorization
Accountability
Identification
Authentication
Authentication is the process of validating a supplicant’s purported identity.
There are three widely used authentication mechanisms, or authentication
factors:
Authorization
Accountability
Pl
gagagaDSFS
Network to anotheented in packet-filtering fir