色在线免费视频-色综合91久久精品中文字幕-色综合久久久久综合99-色综合久久天天综合观看-色综合久久天天综合绕观看

-Language-
Cybersecurity: Access Control
2017-01-03 11:26

Cybercrime can pose a significant threat to higher education institutions and their students, but there are a few security measures institutions can put in place to minimize their vulnerabilities; access control is the first.

Access control approaches determine how users interact with data and other network resources. Furthermore, access control measures ensure data are protected from unauthorized disclosure or modification.

In order to implement and enforce access control measures, universities must first develop a formal document outlining the purpose, scope and roles and responsibilities of users, as well as the policies and procedures associated with access controls. The second task is to define and categorize access for data resources based on confidentiality, integrity and availability of the data. For example, access to research or payroll data should be granted only to users from those departments.


Account management is one method a university could use to manage information system accounts. Identification, authentication and authorization of users to network resources are measures that can be used to manage accounts. Users may authenticate to network resources using one, two or three factors of authentications: the first factor is something they know, such as a password; the second factor is something they have, such as a smart card; and the third factor is something they are, such as finger print or iris scan.

Access to accounts can be enforced through four major types of controls.

1. Mandatory Access Control (MAC)

In MAC, users do not have much freedom to determine who has access to their files. For example, security clearance of users and classification of data (as confidential, secret or top secret) are used as security labels to define the level of trust.

2. Discretionary Access Control (DAC)

In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions.

3. Role-Based Access Control (RBAC)

RBAC allows access based on the job title. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators.

4. Rule-Based Access Control

An example of this would be only allowing students to use the labs during a certain time of the day.


Alternative Approaches

Another access control measure universities are encouraged to practice is enforcement of information flow. Universities are encouraged to regulate where information is allowed to travel both within the university and outside of it. For example, no traffic should be allowed from the students’ labs to the enrollment department. Also, if a professor from one university needs to download a sensitive file from another university, he or she must go through a series of security measures to ensure the confidentiality and integrity of the data both in motion and at rest. Measures such as encrypted tunnels and secure file transfer methods may be used. Documents may also be secured with strong encryption, such as FIPS 140-2-approved encryption. An interconnection security agreement and/or memorandum of understanding can be developed to ensure both universities protect their boundaries through the Assessment and Authorization (A&A) process. The concept of A&A of academic systems will be discussed in a later article.

There are several access control best practices universities can adopt to increase security; separation of duties is one such practice. It reduces fraud activities by ensuring that no one person has power over all activities. For example, the person that determines the access level should not be the same person that creates the accounts. Another best practice may include the concept of least privilege, which ensures granting users the right level of privileges. If a person needs to read a file, then there is no need to grant them delete access. Passphrases, locking accounts after three invalid attempts, disabling unused accounts and setting expiration dates on accounts are also good security practices. Moreover, universities are encouraged to limit remote access to their resources. If they have to allow remote access, it should be done through a Virtual Private Network (VPN) with two-factor authentication required. Furthermore, publicly accessible content would need to be physically and/or logically separated from the internal network by placing them in front of the firewall, an area commonly known as the demilitarized zone (DMZ).


Stephanie Stephanie Stephanie Ellie Ellie Ellie Victoria Victoria Victoria Olivia Olivia Olivia Isabella Isabella Isabella Jayden Jayden Jayden Lucas Lucas Lucas Dylan Dylan Dylan Ryan Ryan Ryan Noah Noah Noah

Sweep the concern Yingze electronic official WeChat

x
Sample Apply
※ Please fill in your information, our company will deal with your problem as soon as possible.
主站蜘蛛池模板: 性感美女在线喷水| 综合亚洲精品一区二区三区| 亚洲国产欧美在线人成aaa| 中国国产一级毛片视频 | 久久婷婷国产综合精品| 在线一区| 久久91精品综合国产首页| 亚洲限制级| 欧美一级看片a免费观看| 国产黑丝在线播放| 婷婷久久综合九色综合九七| 国产亚洲欧洲国产综合一区| 日韩黄色中文字幕| 在线观看免费网址大全| 一级片色| 女人天堂网在线观看2019| 亚洲国产精品免费| 污污的网址| 欧美精品久久久久久久免费观看| 国产精品久久久久一区二区| 麻豆91hd| 99久99久6久热在线播放| 国产午夜亚洲精品不卡| 狼人 成人 综合 亚洲| 日韩高清一区二区三区不卡| 亚洲欧美在线综合| 18岁禁免费网站| www.91在线| 一级黄录像| 久久久国产精品va麻豆| 日本黄大片影院一区二区| 台湾成人性视频免费播放| 亚洲精品国产精品国自产 | 东京加勒比中文字幕波多野结衣| 久久国产视频网站| 毛片最新网址| 欧美人成人亚洲专区中文字幕| yy9299| 久草在线成人| 久久精品嫩草影院免费看| 久久久久久免费一区二区三区|