Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
8 views11 pages

Access Control Methods

The document discusses various aspects of data management and access control systems, including certified artifacts related to Boeing and employee certification processes. It outlines methods of access control such as Role-Based Access Control (RBAC) and Mandatory Access Control (MAC), emphasizing their advantages and disadvantages. Additionally, it touches on intrusion detection systems and distributed databases, highlighting their functions and security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
8 views11 pages

Access Control Methods

The document discusses various aspects of data management and access control systems, including certified artifacts related to Boeing and employee certification processes. It outlines methods of access control such as Role-Based Access Control (RBAC) and Mandatory Access Control (MAC), emphasizing their advantages and disadvantages. Additionally, it touches on intrusion detection systems and distributed databases, highlighting their functions and security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
6) RA M Tetdl Taname = BOeIngl artifact pa Ceotified’) ) i TAS {euctdl Ce certified nd AE artifact (cxaid = araid Maname ='Bocing yy Ea DAT a : ‘ i : , ide eden gare caye tivcrabt eae ET certified ( Aeaid> care A anampz Bocing Jy pa LiCreiel] < 41d ,a'C-E certified a Gicd AM CF Aid, ONNC- #7? © artifack (aptaid= aid A aname = ‘Boeing’ Wy ii) Rat Vrames( Aname = ‘Boeing’ (Aircratt pacesttied)) Klemployee - Tefly Ee Empoye: {g€ename a certified AE Airc raft (Eaid= Aaid a Qname= ‘poeing yn feid=coetd dy DAT EEIAa,EMETe employee Lcery | Eeidaidy E Certified athid dine» 1poreo (Flights ba Aircraft pgcertified employee) BC cial Hight 03 Ac Airckaft a a Ce certified A FLEE Ermployer (4:crushing range Faistance A Es Salary > 100,000 Avaid= caida Eectancreid)y Dat {centr |er Hy FE,ET FOG, FOE, FM Acad? cert AER > C Flight A Dacerd, ead d Ce Wied aD Aaid At AR FNO00 SE OAE* A Arardzceaid nt seidaccid % y Rar Me aid (eznohing raanqe atstance( Aiichl oon to taackasy) BA Farad} aC awtralt WS Fe Highs (F shorn = "Bonn A EeTo: tena?) A arcrashingrang ert wdigtarce) Dent > 4 bos tena [enatd, AN apre Aircrahe AS Fue, FEAT ED, Fary & Flight € FOr, FAY < Fao Fh F 1) FDI, Fe, Certo eehas ‘ Fete peli’ arr = ‘enarad A FRirecah’ 8 Rea, BCP, TY A-rc Ac-+P ~yAP bor * 4 A= face PHkEA MC WY * credo tt, APC dont ke any ime edilote key here. acl fAycy Dh, D RCA,B,C, PLE TG, tT) Fr ABC wablefa Berl : + POG Ad afayD, GH TY Borer made gape ee 1) 7x + War a f ada au -fenTy (aco: Gay Byey EG (My) candidate ke y Prime Altributes = ABD non paeattributes 2G Epp Snr, A relation. Said to be SNF fe Folds aHead: ene OF the follcding’s hdding non “Tivat feistiog ae “1S pouper key B 1s prime attribot ¢ Ab c 3 Seperkey and “nor prime At ABC at ard Po prime! att AD Gt ane cuperkegy “BD EF PPyok supetkey ana, hot wou oe - not Key AAT ig nor Pe a * ae “Oreos ArT ve woys U ane Arerkey “aed tow te Jo the Relation 1 Tee al? SP: fo. not -folioceing the rate Of 3Nt Rcaset) Rn = a BC) Rio.= CAT) RoCAPG HT) Rare cach) Roo = Cy) T3 (BEN) RyCaBd) wow Rr Rr, Rar R22 RBPH are in, SNE o) RBC DI - ~ x Pe eg Per eee eee cB Coe CrAacy cB A tonside? pon 6 p>AaBe b> a>B oon poe p7e nm pc pac ac-yP ac7d + AaB d- fact dayc,O@ 184 Care : ork a fA,BY Ac-+O vty Ase OY not Method Fs nS ney frec re} Noho ow pond have. reeu reg accent ary iadneenarels, ‘ction LE Me earmbinalion of i Mac - Mandatory access lontoo! [palcies and ‘technolgies th ; No tontyo! eee j Acres contro! Dpac —Direct iy — ACCRA contd 3) RBAC —Role- Based ACh -a@ centrally manag cf Security. policies by Mac t Mancotary acte. medet to provide wr teserves Secevsity gg contiol Ses the highest fevel over alceep administration a contol a centialiged © MAC eworks by applying Individetals eTheae security Security labels and labels consist of two elements > classification and Clearance a ‘| e> Compartment - 1) Clasafication: and Cleararre @ Clappification System ecret ekcy) that descai les mac teltes on eatticte: crt; TOP-S esa e Sehsitaity oe ri WO A Spcrek PUTS, Bec erdi C& resource they May aCLe pp cormpaitreents” It- dest beg group & People ~ Clearance p detest eohat Kind Advantages 1) enforceability 2) CompartmentAtisalin. in 3 1) coltabration 2) Managment buick on. vy Discretionary decisions tO nthe Skating option fs most operathg 5 in the form OF DAC + For each datement n Can sett read | alrite Privilages and a table of individuals Access Control ctecenttalige ge cerdity resource Oconer system i yorr ote) » You gould requirments colin graups» System admin SeCrire, acces to and ser Strakes can fe BarNe technique to us ne kwork requirment Adv 1) Concept cial Siraplicity 9) Responsive to bussiness needs pisadVvr ) over |uincerprivilqed users 9) LUmited Conteo! 3) Comprised se curditey entrol (RBA) contol gran aceess privileg, fnclivictual Users clo + Role-based acce bp c ey Role~ based aceepp hagd on the agik thak « wo n popular cay toc {rnplementing least firnity cece 58 bo rat Ue ReAC privilege” policies , users eect to do their job resources. based on Centialiged and o Th ereccites decentiallyed - Adwt ' Fleubility: fasy to maryntenance centialiget ard decentraliged policies: Lower risk = ETPOSUre = a » ay Something to be _pigadvantages 2” el a 1) Complen depleyrnent- at eoith Siroplici ty- 9) Palaneing gecuoity permissions. 3) layered roles and Compute Based Controls 1) Backup ard recovery: XY Authentication ~ The processing oF proving or showing true or genuine al Noict Egh ringer prins valid persoms o Checking Whether the print 8 Valid (HA nok Passotld, Pace tecognisates Authorization + 4 . he process, F giving Permission Giving permission; to Use aata « ereriviliqes 3 o> Auaitive ACLEBP tontol® given persons fi 4) Giving: permission . pre revoking fe permission v t Removing the Ppewmnission. 5) sFoubleshooling Process #, golving serious ogareigalin ‘ spies gor CONTRI OF Pier te. dnd . gorrect folky in the {hich bral Syston: 6) Trtegrity: Provide + conditions : + OF Conatr; related 0 Mectificatiins, strony 4) Encryptiont qnternet related Encrypt the data and sen different “félmect (ene Sa Encrypt pecrypl * 49505, ct the data in 6 SyrMazic : . Asuyrametric (deprerent fates) g) RAPIDE Redundant fay O& Fndependent- Data: We can qo with back -Up Syste Gy ics Stuclent- po Tp ame. [Poe Tp | Marks: view - : be Ue Ig : s mps (nteusion election “systerny'e > checks OF onikys , Netcare Boreic chec' 7 ey Tf any gugpicious activity is found oF wecoqriged OP alert 1s Sen to the User Yo Secure you" rte clap Pication 1) NIDS -"" a) HWS 3 PIDs 4) AIpS° b) Hybrid: NUDS is 2 ’ fromm, the devices ery, monitors the traffic e tonnected to networks, ang reer! oat Compares Wide lees from various yg amd check for NY OM Mferenation and _aterts to adryn: tk Can't detech erat inféimation encrypted er Tt large data ts present te) Gantt identi, che Abteat Thttusion —* yo) ' ' ! fl S& $e 83 HDs '- oe IF briqges signed. ewith in The Systern OF her SYSken. independent “to of adrein io detected: oF If Buspisicoy activity c at takes the enapshech, of enisiting -files and compare Tt to the ‘previous Srapsbes TF analytical Te bend Nn alert Tnbysion § fies were edited & deleted. fo adtein to Redtigad pips oy TH Sb infionk of — mhovtkéy main Server and ronildis the end Server vy Tt eee hebservers by regulary moni sling ant dusey entry of unauttrol ged ffoimation APLD st Based on pips it generally gqicuP oe} servers yesides worth Uybaid | ey is the Combination oF Feo at mite intrusion detection Sy ster - host agent BL systero dqent infétmation Fo the netw9tle o> Th IDS etek fo Combined with netugnle develop & Complete View OF Syston 4)’ petection fy = methed EF tps’ 1) Signaterre base Method - cy Te detects, atta attacks ¢ such as ho of bytes, Number n the bases g specified pattern a "stds ey rp datects thea cohich ae already Known snateectin matusare - teacivantoge Sequence that is) lusect to mal{ctoc4 The Mayr fo ik cannot cetech Mn Mew Wht ead - cased by Atystew ic Danomaly- hated Detecting Methed Te 16 for deteting beth Fompute™ infusing and Misues by Systern — activity and Classifying eilrer aired! anoraloos,” ne tule Distributed Database e> Te consish & two 4 mor files local in different sites @ither fn different netrcok - t-» Portions of the data bases are, Sled 4 reuitiple physical {oCations = and processing tg distributed among emultiple databape nodes: Game nekusdl le Web, dakabose err i datobar System for Storing and fromm internet] information accessible displaying vieb° eo DB Can be used fA wee range O- -funclions remboship data, Client list, p Tinvertoy database logical, palakase! ott, provides a fead- onl oy ar used to retrieve tables and data is each othe I viewor date. data‘ ficrs various, -jnteneltated to

You might also like