当前位置:网站首页>Access control knowledge
Access control knowledge
2022-08-09 22:06:00 【sugar sugar】
一、原理
- Access control is a core element of computer security
- Computer security major目的就是Prevent unauthorized users from accessing resources,Prevent legitimate users from accessing resources in unauthorized ways
- 访问控制的基本元素:主体(An entity that has access to an object),客体(A resource to which the outside world has restricted access,例如 文件,目录,邮箱,程序),访问权限(Describes the ways in which the subject can access the object 【读,写,执行,删除,创建,搜索】)
- 访问控制策略:自主访问控制,强制访问控制,基于角色的访问控制,基于属性的访问控制
- What access control includes:
认证:Consider validating legitimate users
控制策略实现:Selection and management of control strategies,Manage illegal users or unauthorized operations
审计:Track illegal users or unauthorized operations
- Application type of access control,According to the application environment classification can be divided into
物理,网络(防火墙),操作系统,应用(Such as access control policies for data tables in large databases)
二、Access Control Templates
1.自主访问控制(DAC)
Taxonomy of access control:
1.基于访问控制属性:Divided into access control list and access control matrix
2.基于用户和资源分档“安全标签”Divided into multi-level access control
Discretionary access control mainly includes形式:
- 访问控制表:
- 访问能力表:
- 访问控制矩阵:
- 授权关系表:
This is a more concise representation,What permissions the principal has will be recorded every time,And who has this authority will be recorded in this form in detail
Application of discretionary access control:
优点:Each principal has a username,Each object has an access control list that restricts the subject's access to itACL
Therefore, the flexibility of autonomous access control is high,可拓展,粒度细
缺点:For principals who already have permissions,in how to use and disseminate information,No permissions are imposed
For commercial and industrial applications:Such as mainstream operating systems,防火墙ACL
2.强制访问控制(MAC)
MAC通过分级的安全标签实现了信息的单向流通,一直adopted by the military,Two of the most famous models are
Bell-LaPadula模型和Bida模型
3.基于角色的访问控制(RBAC)
原理:A principal is authorized to an authorized group,When the subject accesses the object,Commit the properties of the group first
四、安全级别(TCSEC)
- Dlevel is the lowest security level,对系统提供最小的安全防护(DOS ,WINDOWS98)
- CThe level belongs to liberal security protection
- C1Separation of users and data can be achieved,保护或限制用户权限的传播
- C2比C1divided in more detail,能够实现受控安全保护、个人账户管理、审计和资源隔离(UNIX,LINUX和WindowsNT系统)
3.B级别 Can provide mandatory access control and autonomous access control
4.A级别 Known as the verification design level,is the highest security level available,Only applies to the military
五、总结
I think access control is the control that the subject wants to make non-compliant access to the object,其包含4a strategy or model,分别是自主访问控制,强制访问控制,基于角色的访问控制,基于属性的访问控制
Discretionary access control because it has access control lists(ACL),Access to the form of competency tables, etc,So each object has an access control list that restricts the subject's access to itACL,粒度细,效率低,as long as it is used in industry and commerce
强制访问控制 MAC 和 DAC The difference lies in the mandatory two words,Enforcement is now only up to the system to assign security levels to subjects and objects,Rank comparisons are performed when access control is enforced,它的等级,安全性高,但缺乏灵活性,adopted by the military
基于角色访问控制 A character is put into a group,When performing access control, submit the attributes of the group you are in first,再进行访问,Flexibility is brought about by adding a layer of indirection
观看bStanding computer madman old age视频后,做学习笔记,Most of the pictures in the notes are quoted from the video
边栏推荐
- Environment: Flink version: 1.15.1 jar package: flink-sql-connector-oracle
- 【kali-权限提升】(4.2.7)社会工程学工具包:权限维持创建后门、清除痕迹
- 阿里二面:没有 accept,能建立 TCP 连接吗?
- 小满nestjs(第四章 前置知识装饰器-实现一个GET请求)
- ebook download | "Business executives' IT strategy guide - why enterprises should implement DevOps"
- IS31FL3737B general 12 x 12 LED drive 40 QFN I2C 42 ma
- Swift--多条件排序
- leetcode 二叉树的分层遍历1
- C语言之实现倒置字符串的两种方法
- 真香|持一建证书央企可破格录取
猜你喜欢
URL Protocol 网页打开应用程序
基于模糊PID控制器的水温控制系统仿真
【kali-权限提升】(4.2.7)社会工程学工具包:权限维持创建后门、清除痕迹
【kali-密码攻击】(5.1.1)密码在线破解:Hydra(图形界面)
听音识情绪 | 程序员手把手教你搭建神经网络,更快get女朋友情绪,求生欲max!
【kali-权限提升】(4.2.6)社会工程学工具包(中):中间人攻击工具Ettercap
【IoT毕设】STM32与机智云自助开发平台的宠物智能喂养系统
Haven't tried line art videos this year??
数据分散情况的统计图-盒须图
DSPE-PEG-PDP,DSPE-PEG-OPSS,磷脂-聚乙二醇-巯基吡啶可减少肽的免疫原性
随机推荐
WPF中加载并使用图像资源
[Free column] Xposed plug-in development for Android security [from scratch] tutorial
ebook download | "Business executives' IT strategy guide - why enterprises should implement DevOps"
Queue topic: Implementing stacks with queues
获取数组最后一项别再用array.length-1了
OpenSSL SSL_read: Connection was reset, errno 10054
Abbkine TraKine Pro 活细胞微管染色试剂盒重要特色
Cholesterol-PEG-Thiol,CLS-PEG-SH,胆固醇-聚乙二醇-巯基用于改善溶解度
[Deep learning] pix2pix GAN theory and code implementation
SqlServer 2016 安装相关问题
技术分享 | 接口自动化测试如何处理 Header cookie
DSPE-PEG-Silane,DSPE-PEG-SIL,磷脂-聚乙二醇-硅烷修饰二氧化硅颗粒用
IS31FL3737B 通用12×12 LED驱动器 I2C 42mA 40QFN
AttributeError: module 'click' has no attribute 'get_os_args'
力扣15-三数之和——HashSet&双指针法
Redis 大的情况下,key 要如何处理?
3D感知(二):单目3D物体检测
【随笔】致19期的小伙伴们
听音识情绪 | 程序员手把手教你搭建神经网络,更快get女朋友情绪,求生欲max!
vim编辑器使用