伊人免费视频-伊人免费视频二-伊人免费视频网-伊人免费在线观看高清版-伊人欧美

-Language-
Cybersecurity: Access Control
2017-01-03 11:26

Cybercrime can pose a significant threat to higher education institutions and their students, but there are a few security measures institutions can put in place to minimize their vulnerabilities; access control is the first.

Access control approaches determine how users interact with data and other network resources. Furthermore, access control measures ensure data are protected from unauthorized disclosure or modification.

In order to implement and enforce access control measures, universities must first develop a formal document outlining the purpose, scope and roles and responsibilities of users, as well as the policies and procedures associated with access controls. The second task is to define and categorize access for data resources based on confidentiality, integrity and availability of the data. For example, access to research or payroll data should be granted only to users from those departments.


Account management is one method a university could use to manage information system accounts. Identification, authentication and authorization of users to network resources are measures that can be used to manage accounts. Users may authenticate to network resources using one, two or three factors of authentications: the first factor is something they know, such as a password; the second factor is something they have, such as a smart card; and the third factor is something they are, such as finger print or iris scan.

Access to accounts can be enforced through four major types of controls.

1. Mandatory Access Control (MAC)

In MAC, users do not have much freedom to determine who has access to their files. For example, security clearance of users and classification of data (as confidential, secret or top secret) are used as security labels to define the level of trust.

2. Discretionary Access Control (DAC)

In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions.

3. Role-Based Access Control (RBAC)

RBAC allows access based on the job title. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators.

4. Rule-Based Access Control

An example of this would be only allowing students to use the labs during a certain time of the day.


Alternative Approaches

Another access control measure universities are encouraged to practice is enforcement of information flow. Universities are encouraged to regulate where information is allowed to travel both within the university and outside of it. For example, no traffic should be allowed from the students’ labs to the enrollment department. Also, if a professor from one university needs to download a sensitive file from another university, he or she must go through a series of security measures to ensure the confidentiality and integrity of the data both in motion and at rest. Measures such as encrypted tunnels and secure file transfer methods may be used. Documents may also be secured with strong encryption, such as FIPS 140-2-approved encryption. An interconnection security agreement and/or memorandum of understanding can be developed to ensure both universities protect their boundaries through the Assessment and Authorization (A&A) process. The concept of A&A of academic systems will be discussed in a later article.

There are several access control best practices universities can adopt to increase security; separation of duties is one such practice. It reduces fraud activities by ensuring that no one person has power over all activities. For example, the person that determines the access level should not be the same person that creates the accounts. Another best practice may include the concept of least privilege, which ensures granting users the right level of privileges. If a person needs to read a file, then there is no need to grant them delete access. Passphrases, locking accounts after three invalid attempts, disabling unused accounts and setting expiration dates on accounts are also good security practices. Moreover, universities are encouraged to limit remote access to their resources. If they have to allow remote access, it should be done through a Virtual Private Network (VPN) with two-factor authentication required. Furthermore, publicly accessible content would need to be physically and/or logically separated from the internal network by placing them in front of the firewall, an area commonly known as the demilitarized zone (DMZ).


Stephanie Stephanie Stephanie Ellie Ellie Ellie Victoria Victoria Victoria Olivia Olivia Olivia Isabella Isabella Isabella Jayden Jayden Jayden Lucas Lucas Lucas Dylan Dylan Dylan Ryan Ryan Ryan Noah Noah Noah

Sweep the concern Yingze electronic official WeChat

x
Sample Apply
※ Please fill in your information, our company will deal with your problem as soon as possible.
主站蜘蛛池模板: 国产亚洲精品一区二区在线观看| 黑人双插| 日韩欧美在线一区二区三区| 午夜激情福利在线| 国产亚洲精品久久| 深夜影院一级毛片| 免费人成综合在线视频| a级高清观看视频在线看| 日韩黄色在线| 亚洲精品久久久久久下一站| 免费操人| 国产vr一区二区在线观看| 国产激情一区二区三区在线观看| 国产精选在线| 久久久久久久久免费视频| 日韩欧美~中文字幕| 伊人影视在线观看日韩区| 一区二区免费| 中文字幕欧美成人免费| 在线国产你懂的| 免费看黄资源大全高清| 欧美黑人性大免费高清视频| 国产精品suv| 国产精品福利片| 特黄未满14周岁毛片| 黄色网页免费看| 2022色婷婷综合久久久| 精品麻豆视频| 另类综合视频| 亚洲国产一| 亚洲午夜久久久久影院| 伊人色婷婷综在合线亚洲| 91精品国产视频| 尤物在线观看视频| 日韩三级黄色| 日本高清www免费视频| 成人免费高清视频网址| 欧美爱爱动态| 欧美黄区| 欧美在线一级毛片观看| 国产美女视频一区|