Access Control in Network Security

What is Access Control ?

Access control is where security engineering meets computer science. In the most basic sense, access control in network security is about determining who gets access to what stuff (files, directories, etc). 
The main function of access control is to control which active subject have access to which passive object using some specific access operation, where subjects are usually people or groups and objects are files or directories.

According to this, objects can be resources that are to be protected from unauthorized access, use, or disclosure. And the subject being the user/s or some non-person entities such as applications & services that the access controls apply to. Therefore, access controls in a more technical way are the tools, policies, and mechanisms that enables us to grant or restrict access to any organization’s digital resource, including everything from restricting or granting access to specific files and databases to IT systems.                                                                                                                                                                              So, these types of logical restrictions prevent unauthorized users from doing things they shouldn’t with someone's personal sensitive systems or data. Also, they help to prevent inadvertent exposure or disclosure of  any sensitive item.



The primary types of access control -

1) Mandatory access control (MAC): Mandatory access control establishes strict security policies for individual users and the resources, systems, or data they are allowed to access. These policies are controlled by an administrator; individual users are not given the authority to set, alter, or revoke permissions in a way that contradicts existing policies. 
Under this system, both the subject and the object must be assigned similar security attributes in order to interact with each other. 


2) Discretionary access control (DAC): Once a user is given permission to access an object, they can grant access to other users on an as-needed basis. This may introduce security vulnerabilities, however, as users are able to determine security settings and share permissions without strict oversight from the system administrator.


3) Role-based access control (RBAC): RBAC establishes permissions based on groups  and roles . Individuals can perform any action that is assigned to their role, and may be assigned multiple roles as necessary. Like MAC, users are not permitted to change the level of access control that has been assigned to their role.

Comments

  1. Informative Blog.
    THE Content is fine tuned.
    ThankYou for Enlightening me.
    Hope You guys post more such blogs.✌️

    ReplyDelete

Post a Comment

Popular posts from this blog

Discretionary Access Control (DAC)

Mandatory Access Control (MAC)

Role-Based Access Control (RBAC)