E-Commerce Lab (09) Assignment Access Control @ayush - Mittal

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

E-Commerce Assignment

-AYUSH MITTAL (1902080033)

What is Access Control?


Access control is a fundamental component of data security that dictates
who’s allowed to access and use company information and resources. Through
authentication and authorization, access control policies make sure users are
who they say they are and that they have appropriate access to company data.
Access control can also be applied to limit physical access to campuses,
buildings, rooms, and data centres.

Types of Access Control


1. Discretionary Access Control (DAC)
2. Mandatory Access Control (MAC)
3. Role-Based Access Control (RBAC)

Discretionary Access Control (DAC)


Discretionary Access Control is a type of access control system where an IT administrator or business
owner decides on the access rights for a person for certain locations physically or digitally.

DAC is less secure compared to other systems, as it gives complete control to the end-user over any
object they own, and programs associated with it.

When it comes to security, Discretionary Access Control gives the end-user complete control to set
security level settings for other users and the permissions given to the end-users are inherited into
other programs they use which could potentially lead to malware being executed without the end-
user being aware of it.

ADVANTAGES DISADVANTAGES
1. Users may transfer object ownership to 1. Inherent vulnerabilities (Trojan horse)
another user(s).
2. Users may determine the access type of 2. ACL maintenance or capability
other users.
3. After several attempts, authorization 3. Limited negative authorization power
failures restrict user access.
Mandatory Access Control (MAC)
Mandatory access control (MAC) is a network-based access control where settings, policy and
passwords are established and stored in one secure network and limited to system administrators.
This access control is managed from a central computer where an administrator can grant or revoke
access from any individual at any time and location. It should be noted that access control
technologies are shying away from network-based systems due to limited flexibility.

Mandatory access has a set of security policies constrained to system classification, configuration,
and authentication. It defines and ensures centralized enforcement of confidential security policy
parameters.

ADVANTAGES DISADVANTAGES
1. MAC is more secure as only a system 1. MAC policy decisions are based on
administrator can control the access. network configuration
2. Reduce security errors

Role-Based Access Control (RBAC)


As the name suggests, a role-based access control system is when an administrator doesn’t have to
allocate rights to an individual but gets auto-assigned based on the job role of that individual in the
organisation. So, it’s clear. The administrator has less to do with policymaking.

Role-based access control is high in demand among enterprises. This is because an administrator
doesn’t have to give multiple individuals particular access; the system administrator only has to
assign access to specific job titles.

ADVANTAGES DISADVANTAGES
1. Centralized and comprehensive 1. Less customizable
2. Less hands-on and thus overhead for
administrators

Access Control Mechanism


An access control mechanism controls which clients or applications have access to the X11 server.
Only properly authorized clients can connect to the server. All other clients are denied access and
are terminated with the following error message.

Xlib: connection to hostname refused by server

Xlib: Client is not authorized to connect to server


The connection attempt logs to the server console as:
AUDIT: <Date Time Year>: X: client 6 rejected from IP 129.144.152.193

port 3485 Auth name: MIT-MAGIC-COOKIE-1

Types of access control mechanisms


1. User Based
2. Host Based

User-Based Access
A user-based, or authorization-based, mechanism allows you to give access explicitly to a particular
user on any host machine. The user's client passes authorization data to the server. If the data match
the server's authorization data, the user is allowed access.

Host-Based Access
A host-based mechanism is a general-purpose mechanism. This type of mechanism enables you to
give access to a particular host, in which all users on that host can connect to the server. A host-
based mechanism is a weaker form of access control. If the host has access to the server, all users on
that host are allowed to connect to the server.

The Solaris environment provides the host-based mechanism for backward compatibility.

You might also like