色在线免费视频-色综合91久久精品中文字幕-色综合久久久久综合99-色综合久久天天综合观看-色综合久久天天综合绕观看

-Language-
Cybersecurity: Access Control
2017-01-03 11:26

Cybercrime can pose a significant threat to higher education institutions and their students, but there are a few security measures institutions can put in place to minimize their vulnerabilities; access control is the first.

Access control approaches determine how users interact with data and other network resources. Furthermore, access control measures ensure data are protected from unauthorized disclosure or modification.

In order to implement and enforce access control measures, universities must first develop a formal document outlining the purpose, scope and roles and responsibilities of users, as well as the policies and procedures associated with access controls. The second task is to define and categorize access for data resources based on confidentiality, integrity and availability of the data. For example, access to research or payroll data should be granted only to users from those departments.


Account management is one method a university could use to manage information system accounts. Identification, authentication and authorization of users to network resources are measures that can be used to manage accounts. Users may authenticate to network resources using one, two or three factors of authentications: the first factor is something they know, such as a password; the second factor is something they have, such as a smart card; and the third factor is something they are, such as finger print or iris scan.

Access to accounts can be enforced through four major types of controls.

1. Mandatory Access Control (MAC)

In MAC, users do not have much freedom to determine who has access to their files. For example, security clearance of users and classification of data (as confidential, secret or top secret) are used as security labels to define the level of trust.

2. Discretionary Access Control (DAC)

In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions.

3. Role-Based Access Control (RBAC)

RBAC allows access based on the job title. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators.

4. Rule-Based Access Control

An example of this would be only allowing students to use the labs during a certain time of the day.


Alternative Approaches

Another access control measure universities are encouraged to practice is enforcement of information flow. Universities are encouraged to regulate where information is allowed to travel both within the university and outside of it. For example, no traffic should be allowed from the students’ labs to the enrollment department. Also, if a professor from one university needs to download a sensitive file from another university, he or she must go through a series of security measures to ensure the confidentiality and integrity of the data both in motion and at rest. Measures such as encrypted tunnels and secure file transfer methods may be used. Documents may also be secured with strong encryption, such as FIPS 140-2-approved encryption. An interconnection security agreement and/or memorandum of understanding can be developed to ensure both universities protect their boundaries through the Assessment and Authorization (A&A) process. The concept of A&A of academic systems will be discussed in a later article.

There are several access control best practices universities can adopt to increase security; separation of duties is one such practice. It reduces fraud activities by ensuring that no one person has power over all activities. For example, the person that determines the access level should not be the same person that creates the accounts. Another best practice may include the concept of least privilege, which ensures granting users the right level of privileges. If a person needs to read a file, then there is no need to grant them delete access. Passphrases, locking accounts after three invalid attempts, disabling unused accounts and setting expiration dates on accounts are also good security practices. Moreover, universities are encouraged to limit remote access to their resources. If they have to allow remote access, it should be done through a Virtual Private Network (VPN) with two-factor authentication required. Furthermore, publicly accessible content would need to be physically and/or logically separated from the internal network by placing them in front of the firewall, an area commonly known as the demilitarized zone (DMZ).


Stephanie Stephanie Stephanie Ellie Ellie Ellie Victoria Victoria Victoria Olivia Olivia Olivia Isabella Isabella Isabella Jayden Jayden Jayden Lucas Lucas Lucas Dylan Dylan Dylan Ryan Ryan Ryan Noah Noah Noah

Sweep the concern Yingze electronic official WeChat

x
Sample Apply
※ Please fill in your information, our company will deal with your problem as soon as possible.
主站蜘蛛池模板: 九九精品视频在线观看| 91porn在线观看国产| 成人免费在线| 国产在线爱做人成小视频| 精品国产品国语在线不卡丶 | 成年人午夜| 国产大毛片| 国产精品免费精品自在线观看| a级情欲视频免费观看| 久久精品国产亚洲香蕉| 婷婷精品在线| 在线免费国产视频| 一级视频在线免费观看| 日韩性生活大片| 亚洲精品在线观看视频| 免费大黄网站在线看| 国产一区亚洲二区| 国产精品一区高清在线观看| 黄色福利视频| 2021色噜噜狠狠综曰曰曰| 国产精品久久福利新婚之夜| 久久精品综合免费观看| 日韩欧美视频在线| 亚洲国产剧情在线| 一区二区精品在线观看| 91精品福利久久久| 一级毛片免费在线| 久久青青草原精品国产麻豆| 中文字幕日韩精品亚洲七区| 亚洲日韩成人| 亚洲最大的视频网站| 成人视屏网站| 成年午夜一级毛片视频| 色婷婷激情五月综合| 免费看国产一级片| 欧美一级做a影片爱橙影院| 欧美经典成人在观看线视频| 国产一区二区三区毛片| 国产中文字幕第一页| 国产亚洲精品美女一区二区| 国产伦精品一区二区三区免费|