Security + Exam Guide (Charles River Media Networking/Security)

 < Free Open Study > 


Access control defines the set of procedures used to restrict and monitor access to various types of sensitive information or resources. Access control can be implemented by hardware, software, or by IT administrators to do the following:

Access is granted, limited, or denied, based on one's identity or membership in a predefined group through which privileges are inherited. The time of day or location of the user can also play a role in their level of access. The Security+ certification exam will require your knowledge of the different techniques and methodologies used to implement access control in an enterprise environment.

The most common type of access control in effect is witnessed when a user is denied access to a password-protected network share. Either the user wasn't specifically granted access to the resource or another restrictive measure is being enforced. Next, we will explore some of the important access control models from which many access control methods and techniques are based.

Access Control Models

If you have studied networking fundamentals, you are most likely familiar with the OSI (Open Systems Interconnection) model. The OSI model is used as a theoretical reference for programmers and developers to use as common ground for developing and implementing new programs and network related protocols and devices. (The OSI model will be described in detail in Chapter 4). Just as the OSI model is used as a theoretical approach to networking, access control models are used as theoretical approaches to the various access control methods we will discuss. Although you should focus your attention on the specific access control techniques detailed later in this chapter, it is important for you to familiarize yourself with the basic security models from which access control techniques are derived.

Note 

It is likely that the exam will ask you to identify the type of access control used for a particular security model. For example, The Bell-LaPadula model is based on discretionary access control.

The most common access control models are as follows:

If you are interested in learning more about security models, a wealth of information is available for free on the Internet. Simply go to your Web browser and search Security Models. It is unlikely that the current Security+ exam will drill you on the fine details of the mathematical equations that make up these models. However, it is likely you will have to know what type of access control they use.


 < Free Open Study > 

Категории