Intro To Cyber

Lecture 3

Date Taken: Fall 2025
Status: Completed
Reference: LSU Professor Joseph Khoury, ChatGPT

Access Control

Definitions

AAA Framework

  1. Authentication: Verifying identity using passwords, certificates, or tokens.
    • Automated devices may authenticate using digital certificates for large-scale management.
    • Certificates ensure secure access to services like VPNs and management software.
  2. Authorization: Determining which resources an authenticated user or device can access.
    • Role-based or attribute-based authorization simplifies access management in large environments.
  3. Accounting (Auditing): Logging resource usage, such as login time, activity, and logout, for monitoring and compliance.
    • Ensures that only authorized systems access sensitive information and tracks all activity for auditing purposes.

Access Control Policies

  1. Discretionary Access Control (DAC): Access granted based on identity and rules defined by owners.
  2. Mandatory Access Control (MAC): Access based on security labels compared to user clearances.
  3. Role-Based Access Control (RBAC): Permissions assigned according to organizational roles.
  4. Attribute-Based Access Control (ABAC): Access determined by user, resource, and environment attributes.

Subjects, Objects, and Access Rights

  1. Subject: Entity (user or device) capable of accessing objects. Three classes: Owner, Group, World.
  2. Object: A resource to which access is controlled. Entity used to contain and/or receive information.
  3. Access Rights: Permissions granted to subjects (Read, Write, Execute, Delete, Create, Search).
Access Control/Rights

Unix File Access

UNIX files are managed using inodes (Index Nodes), which store metadata and control information for files.

Unix File Access

Zero Trust

Zero Trust means never automatically trust anything inside or outside your network. Even if someone is already inside, they must prove who they are and have permission to access resources. This approach checks every person, device, and process using things like multi-factor authentication, encryption, access controls, firewalls, and monitoring to keep the network secure.

Planes of Operation

Planes Of Operation

Security Zones

Policy Enforcement Point (PEP)

They acts like a gatekeeper for the network. Decides what to do with connections: allows them, monitors them, or blocks them. Can be made of serval parts working together.

Applying Trust In The Planes

Applying Trust In The Planes