csce522-lect14

csce522-lect14 - CSCE 522 CSCE Access Control Reading...

Info iconThis preview shows pages 1–11. Sign up to view the full content.

View Full Document Right Arrow Icon
CSCE 522 CSCE 522 Access Control Access Control
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 2 Reading Reading Reading for this lecture: Required: Pfleeger: Ch. 4 and 5 Reading for next lecture: Pfleeger: Ch. 4 and 5
Background image of page 2
CSCE 522 - Farkas 3 Access Control Example Access Control Example Access Control Policy for children: Allowed access: House Disallowed access: Automobile
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 4 Access Control Example Access Control Example Access Control Policy for children: Allowed access: House Disallowed access: Automobile
Background image of page 4
CSCE 522 - Farkas 5 Access Control Example Access Control Example Access Control policy for children Allowed access: House: Disallowed access: Automobile Problem! Unauthorized access
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 6 Access Control Example Access Control Example Access Control Policy for children Allowed access: House Kitchen Disallowed access: Automobile Car key
Background image of page 6
CSCE 522 - Farkas 7 Access Control Example Access Control Example Correct Access Control Policy for children Allowed access: House Kitchen Disallowed access: Automobile Car key
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 8 Access Control Access Control Protection objects : system resources for which protection is desirable Memory, file, directory, hardware resource, software resources, etc. Subjects : active entities requesting accesses to resources User, owner, program, etc. Access mode : type of access Read, write, execute
Background image of page 8
CSCE 522 - Farkas 9 Access Control Requirement Access Control Requirement Cannot be bypassed Enforce least-privilege and need-to-know restrictions Enforce organizational policy
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 522 - Farkas 10 Access Control Access Control Access control : ensures that all direct accesses to object are authorized Protects against accidental and
Background image of page 10
Image of page 11
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 522 taught by Professor Farkas during the Fall '11 term at South Carolina.

Page1 / 31

csce522-lect14 - CSCE 522 CSCE Access Control Reading...

This preview shows document pages 1 - 11. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online