Information Security 15- Access Control
Information Security 15- Access Control
ArfanShahzad.c
Access Control
cont…
• Access control is a fundamental concept in cybersecurity and
plays a vital role in safeguarding an organization's digital
assets.
ArfanShahzad.c
Access Control
cont…
• Identification: Access control starts with the identification of
users or
entities seeking access to a system or resource.
• This process typically involves the use of unique identifiers
such as usernames, employee IDs, or biometric data
(e.g., fingerprint or facial recognition).
ArfanShahzad.c
Access Control
cont…
• Authentication: Once identified, users must prove
their identity
through authentication methods.
ArfanShahzad.c
Access Control
cont…
• Authorization: After authentication, the
system determines what
actions or resources the authenticated user is allowed to
access.
ArfanShahzad.c
Access Control
cont…
• Access Control Policies: Organizations define access
control policies to determine how access is granted or denied
based on rules and conditions.
ArfanShahzad.c
Access Control
cont…
• Access Control Mechanisms: Technologies like firewalls,
IDS, IPS, etc. enforce access control by monitoring and
filtering network traffic based on predefined rules.
ArfanShahzad.c
Access Control
cont…
• Privilege Escalation: Ensuring that users
cannot escalate their privileges beyond what is
necessary for their tasks is crucial.
ArfanShahzad.c
Access Control
cont…
• Continuous Monitoring: Regularly
monitoring access attempts and permissions helps
detect anomalies or unauthorized access.
ArfanShahzad.c