Kinh doanh - Marketing
Kinh tế quản lý
Biểu mẫu - Văn bản
Tài chính - Ngân hàng
Công nghệ thông tin
Tiếng anh ngoại ngữ
Kĩ thuật công nghệ
Khoa học tự nhiên
Khoa học xã hội
Văn hóa nghệ thuật
Sức khỏe - Y tế
Văn bản luật
Nông Lâm Ngư
Kỹ năng mềm
Luận văn - Báo cáo
Giải trí - Thư giãn
Tài liệu phổ thông
Văn mẫu
Giới thiệu
Đăng ký
Đăng nhập
Tìm
Danh mục
Kinh doanh - Marketing
Kinh tế quản lý
Biểu mẫu - Văn bản
Tài chính - Ngân hàng
Công nghệ thông tin
Tiếng anh ngoại ngữ
Kĩ thuật công nghệ
Khoa học tự nhiên
Khoa học xã hội
Văn hóa nghệ thuật
Y tế sức khỏe
Văn bản luật
Nông lâm ngư
Kĩ năng mềm
Luận văn - Báo cáo
Giải trí - Thư giãn
Tài liệu phổ thông
Văn mẫu
Thông tin
Điều khoản sử dụng
Quy định bảo mật
Quy chế hoạt động
Chính sách bản quyền
Giới thiệu
Đăng ký
Đăng nhập
0
Trang chủ
Công Nghệ Thông Tin
An ninh - Bảo mật
Chapter 19 – Privilege Management
Đang chuẩn bị liên kết để tải về tài liệu:
Chapter 19 – Privilege Management
Nhã Ý
89
24
ppt
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
An important part if systems and network protection is determining who has access to what. This is call “privilege management or access control” There are 4 major types of “access control” that we will discuss in the next slides User Based – DAC based Group Based – DAC based Role Based – system based roles Rule Based – system based rules | Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki Privilege Management An important part if systems and network protection is determining who has access to what. This is call “privilege management or access control” There are 4 major types of “access control” that we will discuss in the next slides User Based – DAC based Group Based – DAC based Role Based – system based roles Rule Based – system based rules User Based User Based – every user is assigned a unique ID. Permissions are granted to each individual user. If a user has permissions to a resource They can access it. Advantages? Problems? Group Based Groups are created. Users are placed in Groups. Permissions are given to groups. If a user is in a group that has permission to a resource Then that user has permission to the resource Advantages? Problems? Combination of Access When you have user and group based access control, often groups AND users both are assigned permissions to resources. . | Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki Privilege Management An important part if systems and network protection is determining who has access to what. This is call “privilege management or access control” There are 4 major types of “access control” that we will discuss in the next slides User Based – DAC based Group Based – DAC based Role Based – system based roles Rule Based – system based rules User Based User Based – every user is assigned a unique ID. Permissions are granted to each individual user. If a user has permissions to a resource They can access it. Advantages? Problems? Group Based Groups are created. Users are placed in Groups. Permissions are given to groups. If a user is in a group that has permission to a resource Then that user has permission to the resource Advantages? Problems? Combination of Access When you have user and group based access control, often groups AND users both are assigned permissions to resources. And the total combination of permissions are your effective permissions. Example: John has Read access to file1.txt John is a member of managers, which has write access to file1.txt Johns effective access is: read + write No Access There is usually a special permission called “No Access”. No access is a permission that you simply cannot shake, and strips all your other permissions away. Example: John is a member of managers which has read + write to creditcards.txt John is under investigation, as such he has been directly assigned No Access to creditcards.txt Johns effective permissions for creditcards.txt = No Access Role Based Like Groups, Roles are special groups that is synonymous with a job or set of function. With role based access control, permissions are assigned to roles. Users are put in roles and receive the access that is relevant to that role. Advantages: Centralized management Good for places that have a lot of job changes or turnover Fight “authorization creep” .
TÀI LIỆU LIÊN QUAN
Chapter 19. Mail and Address Book Email is a fast, cheap, convenient communication medium.
Bài giảng Hệ điều hành nâng cao - Chapter 19: Real - Time Systems
LUYỆN ĐỌC TIẾNG ANH QUA CÁC TÁC PHẨM VĂN HỌC –TWENTY YEARS AFTER ALEXANDRE DUMAS CHAPTER 19
LUYỆN ĐỌC TIẾNG ANH QUA CÁC TÁC PHẨM VĂN HỌC –TEN YEARS AFTER ALEXANDRE DUMAS CHAPTER 19
The Ecology of the Cambrian Radiation - Andrey Zhuravlev - Chapter 19
Entomology 3rd edition - C.Gillott - Chapter 19
LUYỆN ĐỌC TIẾNG ANH QUA CÁC TÁC PHẨM VĂN HỌC – THE MAN IN THE IRON MASK ALEXANDRE DUMAS CHAPTER 19
Night and Day Virginia Woolf Chapter 19
LUYỆN ĐỌC TIẾNG ANH QUA CÁC TÁC PHẨM VĂN HỌC –MOBY DICK Herman Melville CHAPTER 19
Springer Old Growth Forests - Chapter 19
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.