2. SYLLABUS
Access Control Concepts
Unix and windows access control summary
Other issues in access control
Introduction to browser isolation.
2 SURBHI SAROHA
3. Access Control Concepts
SURBHI SAROHA3
Access control is a security technique that
regulates who or what can view or use resources
in a computing environment.
It is a fundamental concept in security that
minimizes risk to the business or organization.
Logical access control limits connections to
computer networks, system files and data.
4. Cont…..
SURBHI SAROHA4
Access controls protect against threats such as
unauthorized access, inappropriate modification
of data, and loss of confidentiality.
Access control is achieved by implementing
strong technical, physical, and administrative
measures.
5. Unix and windows access control
summary
SURBHI SAROHA5
UNIX -- Access Control
UNIX uses access control lists. A user logs into
UNIX and has a right to start processes that
make requests.
A process is "bigger" than a subject, many
domains may correspond to a single process.
Each process has an identity(uid).
This uid is obtained from the file that stores user
passwords: /etc/passwd. An entry in /etc/passwd
may look like:
7. Cont….
SURBHI SAROHA7
Every process inherits its uid based on which user
starts the process.
Every process also has an effective uid, also a
number, which may be different from the uid.
Finally, each UNIX process is a member of some
groups. In the original UNIX every user was a
member of one group.
Currently, users can be members of more than one
group. Group information can be gotten from
/etc/passwd or from a file /etc/groups.
System administrators control the latter file. An entry
in /etc/groups may look like:
8. Other issues in access control
SURBHI SAROHA8
The majority of access control problems stem
from outdated equipment, keycards falling into
the wrong hands, and a lack of integration
with other building systems.
To some degree, all three issues might be
causing problems.
9. Introduction to browser isolation
SURBHI SAROHA9
Browser Isolation (also known as
Web Isolation) is a technology that contains
web browsing activity inside an isolated
environment, like a sandbox or virtual machine, in
order to protect computers from any malware the
user may encounter.
This isolation may occur locally on the computer
or remotely on a server.