Top Banner
Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif
15

Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Dec 20, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Access Controls

Supervised by: Dr.Lo’ai Tawalbeh

Prepared by: Abeer Saif

Page 2: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Introduction:

Access Controls: The security features that control how users and systems communicate and interact with one another.

Access: The flow of information between subject and object.

Subject: An active entity that requests access to an object or the data in an object. Such as a user, program, or process that accesses an object to accomplish a task.

Page 3: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Introduction:

Object: A passive entity that contains information. Such as: a computer, database, file, computer program, directory, or field in a table in a database, etc.

Page 4: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Introduction:

Access controls are extremely important because they are one of the first lines of defense used to fight against unauthorized access to systems and network resources.

Access controls give organizations the ability to control, restrict, monitor, and protect resource availability, integrity, and confidentiality.

Page 5: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Access Control Administration:

Two Basic forms: Centralized: One entity is responsible for

overseeing access to all corporate resources.

Provides a consistent and uniform method of controlling access rights.

Decentralized: Gives control of access to the people who are closer to the resources.

Has no methods for consistent control, lacks proper consistency.

Page 6: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Centralized & Decentralized access:

Page 7: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Access Control methods:

Access controls can be implemented at various layers of an organization, network, and individual systems.

Three broad categories: Administrative Physical Technical (aka Logical)

Page 8: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

Access Controls

ISA 2004Internet Security & Acceleration Server 2004

Page 9: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

ISA 2004 overview:

Page 10: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

ISA 2004 overview:

ISA Server 2004 main roles: Firewall.

Packet inspection & filtering. Stateful inspection & filtering. Application layer inspection & filtering.

VPN server. Unified firewall & VPN Server.

Proxy and Caching server. Forward cache. Backward cache.

Page 11: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

ISA 2004 overview:

ISA Server 2004 as a VPN server: VPN (Virtual Private Network): is a secure

network connection created through a public network such as the Internet.

Types of VPN connections: VPN clients. Site-Site VPN. Quarantine Control.

Page 12: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

ISA 2004 overview:

Why use VPN connections: Availability. Cost.

Internet Protocol security (IPSec): A set of industry-standard, cryptography based protection services and protocols. IPSec protects all protocols in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite and Internet communications.

Page 13: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

ISA 2004 overview:

Protocols supported by ISA Server 2004: Point-Point tunneling protocol (PPTP):

Uses Microsoft’s encryption (MPPE). Less Complex to set than IPsec.

Layer two tunneling protocol (L2TP): More secure than PPTP. IPsec concepts more complex.

Page 14: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

ISA 2004 overview:

Page 15: Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.

References:

CISSP All-in-One Exam Guide. Installing, Configuring, and Administering

Microsoft Windows XP Professional.MCSA/MCSE Self-Paced Training Kit (Exam 70-270).

Implementing Microsoft Internet Security and Acceleration Server 2004. MCSA/MCSE Self-Paced Training Kit (Exam 70-350).