SlideShare a Scribd company logo
3
Most read
4
Most read
5
Most read
Information Security
Protection Model
Access Control Model
Protection Models
• In information security, protection models refer to the various
methods and techniques used to protect systems and data from
unauthorized access, use, disclosure, disruption, modification, or
destruction.
• Here are some common protection models:
Protection Models cont…
1. Access Control Model
2. Confidentiality Model
3. Integrity Model
4. Availability Model
5. Defense in Depth Model
6. Least Privilege Model
7. Principle of Least Astonishment (POLA) Model
Protection Models cont… Access Control Model
• The Access Control Model is a security model that governs how users are
granted access to system resources and data.
• It determines the mechanisms and rules for authentication, authorization,
and accounting (AAA) in order to enforce proper access controls.
• The goal of the Access Control Model is to ensure that only authorized
individuals or processes are allowed to access specific resources or
perform certain actions within a system.
Protection Models cont… Access Control Model
• There are several types of Access Control Models, including:
1. Mandatory Access Control (MAC)
2. Discretionary Access Control (DAC)
3. Role-Based Access Control (RBAC)
4. Attribute-Based Access Control (ABAC)
5. Rule-Based Access Control (RBAC)
Protection Models cont…
Access Control Model: Mandatory Access Control (MAC)
• This model assigns security labels (e.g., security classifications or
levels) to both users and system resources.
• Access decisions are based on the labels and predefined access rules,
which are typically enforced by the operating system or security
software.
Protection Models cont…
Access Control Model: Mandatory Access Control (MAC)
Protection Models cont…
Access Control Model: Discretionary Access Control (DAC)
• In this model, access control decisions are left to the discretion of the
resource owner.
• Each resource has an associated Access Control List (ACL) that
specifies the permissions granted to individual users or groups.
Protection Models cont…
Access Control Model: Discretionary Access Control (DAC)
Protection Models cont…
Access Control Model: Discretionary Access Control (DAC)
Protection Models cont…
Access Control Model: Role-Based Access Control (RBAC)
• RBAC is based on the concept of roles.
• Users are assigned specific roles, and permissions are assigned to
these roles rather than to individual users.
• This simplifies administration and enables more efficient
management of access controls.
Protection Models cont…
Access Control Model: Role-Based Access Control (RBAC)
Protection Models cont…
Access Control Model: Role-Based Access Control (RBAC)
Protection Models cont…
Access Control Model: Attribute-Based Access Control (ABAC)
• ABAC takes into account various attributes or characteristics of
users, resources, and the environment to make access control
decisions.
• Attributes such as user roles, time of access, location, and data
classification can be considered when determining access
permissions.
Protection Models cont…
Access Control Model: Attribute-Based Access Control (ABAC)
Protection Models cont…
Access Control Model: Rule-Based Access Control (RBAC)
• RBAC uses a set of predefined rules to determine access permissions.
• These rules are based on conditions or criteria specified in policies
and are evaluated to determine whether access should be granted or
denied.
Protection Models cont… Access Control Model
• Each Access Control Model has its own advantages and is suitable for
different security requirements and environments.
• Organizations may choose to implement one or a combination of
these models based on their specific needs and risk tolerance.

More Related Content

PPTX
Group 5 computer security and terms.pptx
PPTX
Access Control in internet and computer science.pptx
PPTX
Lecture-12-ACL_information_Security.pptx
PDF
S5-Authorization
PPTX
Least privilege, access control, operating system security
PPTX
unit 5 in the database for master of Engineering
PPTX
484444398-Chapter-11-Access-Control-Fundamentals.pptx
PDF
Access Control Fundamentals
Group 5 computer security and terms.pptx
Access Control in internet and computer science.pptx
Lecture-12-ACL_information_Security.pptx
S5-Authorization
Least privilege, access control, operating system security
unit 5 in the database for master of Engineering
484444398-Chapter-11-Access-Control-Fundamentals.pptx
Access Control Fundamentals

Similar to Information Security (Protection Model _ Access Control ).pdf (20)

PPT
lecture7-accesscontroool_ct1405.pptx.ppt
PPTX
resource security and protection in distributed system
PPTX
Authorization Pattern.pptx power point s
PPSX
Final year presentation
PPT
Design for security in operating system
PPT
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
PPT
access control information security professor hossein saiedian fall 2014
PDF
Application Security -- Authorization Models
PPTX
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
PPTX
Database security and security in networks
PPTX
information security(authentication application, Authentication and Access Co...
PPT
4_5949547032388570388.ppt
PDF
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
PDF
Slide Deck CISSP Class Session 4
PPT
Access control mechanism (DAC, MAC and RBAC).ppt
PDF
access-control-basics-murat-kantarcioglu.pdf
PPT
Isys20261 lecture 12
PPT
Sameer Mitter - Access Control in Cloud Security
PPTX
Identity and Access Management-CLOUD.pptx
PPTX
database Security for data security .pptx
lecture7-accesscontroool_ct1405.pptx.ppt
resource security and protection in distributed system
Authorization Pattern.pptx power point s
Final year presentation
Design for security in operating system
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
access control information security professor hossein saiedian fall 2014
Application Security -- Authorization Models
Slide Deck – Session 4 – FRSecure CISSP Mentor Program 2017
Database security and security in networks
information security(authentication application, Authentication and Access Co...
4_5949547032388570388.ppt
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
Slide Deck CISSP Class Session 4
Access control mechanism (DAC, MAC and RBAC).ppt
access-control-basics-murat-kantarcioglu.pdf
Isys20261 lecture 12
Sameer Mitter - Access Control in Cloud Security
Identity and Access Management-CLOUD.pptx
database Security for data security .pptx
Ad

More from faiziikanwal47 (18)

PDF
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
PDF
Cloud Computing Models.uututuutututtuutut
PPTX
1602984149-1-introduction.pptx4hjdqehjeg
PPTX
1602984229-2-req-engg-process.pptxj89009
PPT
lecture9-190719030941 globalized availab
PPTX
Ch5 System modeling globally availabless
PDF
Information Security 20- Risk Assessment.pdf
PDF
Information Security 16- Information Flow.pdf
PDF
Information Security 10- Network Security.pdf
PDF
Information Security 07- Audit.pdnjn;pp[pf
PDF
Information Security 06- Hashing and Digital Signatures.pdf
PDF
Information Security 05- Encryption.pdfn
PDF
information security Lecture by cyber security
PDF
market side business mind side to get enough
PDF
information security by cryptography sid
PDF
Information Security 08- Intrusion Detection and Response (1).pdf
PPT
12Outlier.for software introductionalism
PPT
CurrieTesting. in engineering field relevant
01A_Niyyat-Ka-Maani-Awr-Ahmiyya6666t.pdf
Cloud Computing Models.uututuutututtuutut
1602984149-1-introduction.pptx4hjdqehjeg
1602984229-2-req-engg-process.pptxj89009
lecture9-190719030941 globalized availab
Ch5 System modeling globally availabless
Information Security 20- Risk Assessment.pdf
Information Security 16- Information Flow.pdf
Information Security 10- Network Security.pdf
Information Security 07- Audit.pdnjn;pp[pf
Information Security 06- Hashing and Digital Signatures.pdf
Information Security 05- Encryption.pdfn
information security Lecture by cyber security
market side business mind side to get enough
information security by cryptography sid
Information Security 08- Intrusion Detection and Response (1).pdf
12Outlier.for software introductionalism
CurrieTesting. in engineering field relevant
Ad

Recently uploaded (20)

DOCX
Epoxy Coated Steel Bolted Tanks for Crude Oil Large-Scale Raw Oil Containment...
PPTX
UN Environmental Inventory User Training 2021.pptx
PPTX
ser tico.pptxXYDTRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRY
PPTX
Plant_Cell_Presentation.pptx.com learning purpose
PPTX
Making GREEN and Sustainable Urban Spaces
DOCX
Epoxy Coated Steel Bolted Tanks for Agricultural Waste Biogas Digesters Turns...
PDF
Effect of salinity on biochimical and anatomical characteristics of sweet pep...
PPTX
NOISE-MITIGATION.-pptxnaksnsbaksjvdksbsksk
PPTX
Green and Cream Aesthetic Group Project Presentation.pptx
DOCX
Epoxy Coated Steel Bolted Tanks for Anaerobic Digestion (AD) Plants Core Comp...
PDF
Tree Biomechanics, a concise presentation
PPTX
Environmental Ethics: issues and possible solutions
PPTX
Delivery census may 2025.pptxMNNN HJTDV U
PDF
PET Hydrolysis (polyethylene terepthalate Hydrolysis)
PPTX
9.-Sedatives-and-Hypnotics.pptxcccccccccccccccccccppt
PPTX
Topic Globalisation and Lifelines of National Economy (1).pptx
PDF
Effective factors on adoption of intercropping and it’s role on development o...
PDF
Blue Economy Development Framework for Indonesias Economic Transformation.pdf
PPTX
Conformity-and-Deviance module 7 ucsp grade 12
DOCX
Epoxy Coated Steel Bolted Tanks for Leachate Storage Securely Contain Landfil...
Epoxy Coated Steel Bolted Tanks for Crude Oil Large-Scale Raw Oil Containment...
UN Environmental Inventory User Training 2021.pptx
ser tico.pptxXYDTRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRY
Plant_Cell_Presentation.pptx.com learning purpose
Making GREEN and Sustainable Urban Spaces
Epoxy Coated Steel Bolted Tanks for Agricultural Waste Biogas Digesters Turns...
Effect of salinity on biochimical and anatomical characteristics of sweet pep...
NOISE-MITIGATION.-pptxnaksnsbaksjvdksbsksk
Green and Cream Aesthetic Group Project Presentation.pptx
Epoxy Coated Steel Bolted Tanks for Anaerobic Digestion (AD) Plants Core Comp...
Tree Biomechanics, a concise presentation
Environmental Ethics: issues and possible solutions
Delivery census may 2025.pptxMNNN HJTDV U
PET Hydrolysis (polyethylene terepthalate Hydrolysis)
9.-Sedatives-and-Hypnotics.pptxcccccccccccccccccccppt
Topic Globalisation and Lifelines of National Economy (1).pptx
Effective factors on adoption of intercropping and it’s role on development o...
Blue Economy Development Framework for Indonesias Economic Transformation.pdf
Conformity-and-Deviance module 7 ucsp grade 12
Epoxy Coated Steel Bolted Tanks for Leachate Storage Securely Contain Landfil...

Information Security (Protection Model _ Access Control ).pdf

  • 2. Protection Models • In information security, protection models refer to the various methods and techniques used to protect systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. • Here are some common protection models:
  • 3. Protection Models cont… 1. Access Control Model 2. Confidentiality Model 3. Integrity Model 4. Availability Model 5. Defense in Depth Model 6. Least Privilege Model 7. Principle of Least Astonishment (POLA) Model
  • 4. Protection Models cont… Access Control Model • The Access Control Model is a security model that governs how users are granted access to system resources and data. • It determines the mechanisms and rules for authentication, authorization, and accounting (AAA) in order to enforce proper access controls. • The goal of the Access Control Model is to ensure that only authorized individuals or processes are allowed to access specific resources or perform certain actions within a system.
  • 5. Protection Models cont… Access Control Model • There are several types of Access Control Models, including: 1. Mandatory Access Control (MAC) 2. Discretionary Access Control (DAC) 3. Role-Based Access Control (RBAC) 4. Attribute-Based Access Control (ABAC) 5. Rule-Based Access Control (RBAC)
  • 6. Protection Models cont… Access Control Model: Mandatory Access Control (MAC) • This model assigns security labels (e.g., security classifications or levels) to both users and system resources. • Access decisions are based on the labels and predefined access rules, which are typically enforced by the operating system or security software.
  • 7. Protection Models cont… Access Control Model: Mandatory Access Control (MAC)
  • 8. Protection Models cont… Access Control Model: Discretionary Access Control (DAC) • In this model, access control decisions are left to the discretion of the resource owner. • Each resource has an associated Access Control List (ACL) that specifies the permissions granted to individual users or groups.
  • 9. Protection Models cont… Access Control Model: Discretionary Access Control (DAC)
  • 10. Protection Models cont… Access Control Model: Discretionary Access Control (DAC)
  • 11. Protection Models cont… Access Control Model: Role-Based Access Control (RBAC) • RBAC is based on the concept of roles. • Users are assigned specific roles, and permissions are assigned to these roles rather than to individual users. • This simplifies administration and enables more efficient management of access controls.
  • 12. Protection Models cont… Access Control Model: Role-Based Access Control (RBAC)
  • 13. Protection Models cont… Access Control Model: Role-Based Access Control (RBAC)
  • 14. Protection Models cont… Access Control Model: Attribute-Based Access Control (ABAC) • ABAC takes into account various attributes or characteristics of users, resources, and the environment to make access control decisions. • Attributes such as user roles, time of access, location, and data classification can be considered when determining access permissions.
  • 15. Protection Models cont… Access Control Model: Attribute-Based Access Control (ABAC)
  • 16. Protection Models cont… Access Control Model: Rule-Based Access Control (RBAC) • RBAC uses a set of predefined rules to determine access permissions. • These rules are based on conditions or criteria specified in policies and are evaluated to determine whether access should be granted or denied.
  • 17. Protection Models cont… Access Control Model • Each Access Control Model has its own advantages and is suitable for different security requirements and environments. • Organizations may choose to implement one or a combination of these models based on their specific needs and risk tolerance.