Ais 11 Lesson 5 and 6

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

2ND SEMESTER

A.Y. 2022 – 2023 |AIS 11


LESSON 5 AND 6
ACCESS CONTROL There are three widely used authentication
mechanisms, or authentication factors:
is the method by which systems determine
a. Something a Supplicant Knows
whether and how to admit a user into a trusted.
 This factor of authentication
relies upon what the supplicant
AREA OF THE ORGANIZATION knows and can recall—for
that is, information systems, restricted areas such example, a password,
as computer rooms, and the entire physical passphrase, or other unique
location. authentication code, such as a
personal identification number
Access control can be: (PIN).
 A password is a private word
MANDATORY ACCESS CONTROLS or combination of characters
(MACs) that only the user should know.
 use data classification schemes; they  A passphrase is a series of
give users and data owners limited characters, typically longer
control over access to information than a password, from which a
resources. virtual password is derived.
 A variation of this form of access control b. Something a Supplicant Has
is called lattice-based access control, in  This authentication factor relies
which users are assigned a matrix of upon something a supplicant
authorizations for particular areas of has and can produce when
access. necessary. One example is
 With this type of control, the column of dumb cards, such as ID cards
attributes associated with a particular or ATM cards with magnetic
object is referred to as an access control stripes containing the digital
list (ACL). (and often encrypted) user PIN,
 The row of attributes associated with a against which the number a
particular subject is referred to as a user input is compared.
capabilities table.  Another common device is the
token, a card or key fob with a
computer chip and a liquid
NONDISCRETIONARY CONTROLS crystal display that shows a
 are a strictly-enforced version of MACs computer-generated number
that are managed by a central authority used to support remote login
in the organization and can be based on authentication. Once
an individual’s role—role-based controls synchronous tokens are
—or a specified set of tasks (subject- or synchronized with a server,
object-based)—task-based controls. both devices (server and token)
use the same time or a time-
DISCRETIONARY ACCESS CONTROLS based database to generate a
(DACs) number that must be entered
 are implemented at the discretion or during the user login phase.
option of the data user.  Asynchronous tokens, which
don’t require that the server
In general, all access control approaches rely and tokens all maintain the
on as the following mechanism: same time setting, use a
challenge/response system, in
1. IDENTIFICATION which the server challenges the
supplicant during login with a
Identification is a mechanism whereby an
numerical sequence.
unverified entity—called a supplicant—that seeks
c. Something a Supplicant Is or Can
access to a resource proposes a label by which
Produce
they are known to the system. The label applied
 This authentication factor relies
to the supplicant (or supplied by the supplicant) is
upon individual characteristics,
called an identifier (ID).
such as fingerprints, palm
prints, hand topography, hand
2. AUTHENTICATION geometry, or retina and iris
Authentication is the process of validating a scans, or something a
supplicant’s purported identity. supplicant can produce on
demand, such as voice
DACUSIN, SHAINA MAE R. | 1
AIS 11 2ND SEMESTER | LESSON 5 AND 6
patterns, signatures, or There are three subsets of packet-filtering
keyboard kinetic firewalls:
measurements. a. Static filtering requires that the filtering
rules be developed and installed with
3. AUTHORIZATION the firewall.
Authorization is the matching of an authenticated b. A dynamic filtering firewall can react
entity to a list of information assets and to an emergent event and update or
corresponding access levels. This list is usually create rules to deal with that event.
an ACL or access control matrix. c. Stateful inspection firewalls, also
called stateful firewalls, keep track of
In general, authorization can be handled in one of each network connection between
three ways: internal and external systems using a
a. Authorization for each authenticated state table. A state table tracks the state
user and context of each packet in the
b. Authorization for members of the conversation by recording which station
group sent what packet and when.
c. Authorization across multiple
systems Firewalls categorized by generation
Firewalls are also frequently categorized by their
Authorization credentials (sometimes called position on a developmental continuum—that is,
authorization tickets) are issued by an by generation. At present, there are five generally
authenticator and are honored by many or all recognized generations of firewalls, and these
systems within the authentication domain. generations

4. ACCOUNTABILITY 1. FIRST GENERATION FIREWALLS


Accountability, also known as auditability, firewalls are static packet-filtering firewalls—that
ensures that all actions on a system—authorized is, simple networking devices that filter packets
or unauthorized—can be attributed to an according to their headers as the packets travel
authenticated identity. to and from the organization’s networks.

FIREWALLS SECOND GENERATION FIREWALLS


are application-level firewalls or proxy servers—
A firewall in an information security program is
that is, dedicated systems that are separate from
similar to a building’s firewall in that it prevents
the filtering router and that provide intermediate
specific types of information from moving
services for requestors.
between the outside world, known as the
untrusted network (for example, the Internet), and
the inside world, known as the trusted network. THIRD GENERATION FIREWALLS
are stateful inspection firewalls, which, as
Firewalls can be categorized by: described previously, monitor network
connections between internal and external
systems using state tables.
FIREWALL PROCESSING MODES
 Firewalls fall into five major processing- FOURTH GENERATION FIREWALLS
mode categories. Hybrid firewalls use a which are also known as dynamic packet-filtering
combination of the other four modes, firewalls, allow only a particular packet with a
and in practice, most firewalls fall into particular source, destination, and port address to
this category, since most firewall enter.
implementations use multiple
approaches.
 The packet-filtering firewall, also simply
FIFTH GENERATION FIREWALLS
called a filtering firewall, examines the include the kernel proxy, a specialized form that
header information of data packets that works under Windows NT Executive, which is the
come into a network. kernel of Windows NT. This type of firewall
evaluates packets at multiple layers of the
 Packet-filtering firewalls scan network
protocol stack, by checking security in the kernel
data packets looking for compliance with
as data is passed up and down the stack.
or violation of the rules of the firewall’s
database. Filtering firewalls inspect
packets at the network layer, or Layer 3,
of the Open Systems Interconnect (OSI)
model, which represents the seven
layers of networking processes.

DACUSIN, SHAINA MAE R. | 2


AIS 11 2ND SEMESTER | LESSON 5 AND 6

FIREWALLS CATEGORIZED BY
There are three VPN Technologies:
STRUCTURE 1. A trusted VPN, also known as legacy
Firewalls can also be categorized by the VPN, uses leased circuits from a service
structures used to implement them: provider and conducts packet switching
over these leased circuits.
COMMERICAL-GRADE FIREWALL 2. Secure VPNs use security protocols
APPLIANCES and encrypt traffic transmitted across
Firewall appliances are stand-alone, self- unsecured public networks like the
contained combinations of computing hardware Internet.
and software. 3. A hybrid VPN combines the two,
providing encrypted transmissions (as in
COMMERCIAL-GRADE FIREWALLS secure VPN) over some or all of a
trusted VPN network.
SYSTEM
A commercial-grade firewall system consists of
application software that is configured for the CRYPTOLOGY
firewall application and run on a general-purpose The science of encryption, known as cryptology,
computer. encompasses cryptography and cryptanalysis.
Cryptography, which comes from the Greek
SMALL OFFICE/ HOMEOFFICE (SOHO) words kryptos, meaning “hidden,” and graphein,
meaning “to write,” is the process of making and
FIREWALL APPLIANCES using codes to secure the transmission of
These devices, also known as broadband information.
gateways or DSL/cable modem routers, connect
the user’s local area network or a specific
computer system to the Internetworking device—
CRYPTONALYSIS
is the process of obtaining the original message
in this case, the cable modem or DSL router
(called the plaintext) from an encrypted message
provided by the Internet service provider (ISP).
(called the ciphertext) without knowing the
In recent years, the broadband router devices
algorithms and keys used to perform the
that can function as packet-filtering firewalls have
encryption.
been enhanced to combine the features of
Wireless Access Points (WAPs) as well as small
stackable LAN switches in a single device. These ENCRYPTION
convenient combination devices give the is the process of converting an original message
residential/SOHO user the strong protection that into a form that is unreadable to unauthorized
comes from the use of Network Address individuals. Decryption is the process of
Translation (NAT) services. converting the ciphertext message back into
NAT assigns non-routing local addresses to the plaintext so that it can be readily understood.
computer systems in the local area network and
uses the single ISP-assigned address to TERMINOLOGIES
communicate with the Internet. To understand the fundamentals of cryptography,
you must know the meanings of the following
RESIDENTIAL-GRADE FIREWALL terms:
SOFTWARE
Another method of protecting the residential user ALGORITHM
is to install a software firewall directly on the The programmatic steps used to convert an
user’s unencrypted message into an encrypted
system. These applications claim to detect and sequence of bits that represent the message;
prevent intrusion into the user’s system without sometimes refers to the programs that enable the
affecting usability. cryptographic processes.

CIPHER OR CRYPTOSYSTEM
VIRTUAL PRIVATE NETWORKS An encryption method or process encompassing
the algorithm, key(s) or cryptovariable(s), and
(VPNs) procedures used to perform encryption and
A virtual private network (VPN) is a private and
decryption.
secure network connection between systems that
uses the data communication capability of an
unsecured and public network. CIPHERTEXT OR CRYPTOGRAM
The encoded message resulting from an
encryption.

DACUSIN, SHAINA MAE R. | 3


AIS 11 2ND SEMESTER | LESSON 5 AND 6

CODE
The process of converting components (words or
phrases) of an unencrypted message into
encrypted components.

DECIPHER
To decrypt, decode, or convert, ciphertext into the
equivalent plaintext

ENCIPHER
To encrypt, encode, or convert, plaintext into the
equivalent ciphertext

KEY OR CRYPTOVARIABLE
The information used in conjunction with an
algorithm to create the ciphertext from the
plaintext or derive the plaintext from the
ciphertext

KEYSPACE
The entire range of values that can be used to
construct an individual key.

LINK ENCRYPTION
A series of encryptions and decryptions between
a number of systems, wherein each system in a
network decrypts the message sent to it and then
reencrypts it using different keys and sends it to
the next neighbor, and this process continues
until the message reaches the final destination.

PLAINTEXT OR CLEARTEXT
The original unencrypted message, or a message
that has been successfully decrypted.

STEGANOGRAPHY
The hiding of messages—for example, within the
digital encoding of a picture or graphic.

WORK FACTOR
The amount of effort (usually in hours) required to
perform cryptanalysis to decode an encrypted
message when the key or algorithm (or both) are
unknown

DACUSIN, SHAINA MAE R. | 4

You might also like