

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
The concept of authorization and its types. Authorization is a security mechanism that determines user privileges or access levels related to system resources. It is preceded by authentication for user identity verification. three types of authorization: user rights, role-based authorization, and access control lists. It also explains the advantages of using role-based authorization. useful for students studying computer security and related fields.
Typology: Cheat Sheet
1 / 3
This page cannot be seen from the preview
Don't miss anything!
Authorization is a security mechanism used to determine user privileges or access levels related to system resources, including computer programs, files, services, data and application features. Authorization is normally preceded by authentication for user identity verification. System administrators are typically assigned permission levels covering all system and user resources. There are a variety of types of authorization systems, including user rights, role-based authorization, access control lists, and rule-based authorization.
User rights is a security feature that controls that user can use which resources and what actions can he perform over those resources. Privileges or user rights are different from permissions. A systems administrator assigns a permission to let a user access a resource and assigns a right to let a user perform a task which affects the entire system. Other user rights are implicit and are rights that are granted to default groups that are created by the operating system instead of by administrators. These rights cannot be removed. In the typical implementation of a UNIX system, implicit privileges are granted to the root account. This account is authorized to do anything on the system. On some UNIX systems, system administrators can grant certain users the right to use specific commands as root, without issuing them the root password. An application that can do this, and which is in the public domain, is called sudo.
RBAC is a security approach of restricting system access to authorized users. Within organization, roles are created for various job functions. The permissions to perform certain operations are assigned to specific roles Users are assigned particular roles, and through those role assignments they acquire the permissions needed to perform particular system functions. Following are the three primary rules are defined for RBAC : (a) Role assignment: A subject can exercise a permission only if the subject has selected or been assigned a role. (b) Role authorization: A subject's active role must be authorized for the subject. This rule ensures that users can take on only roles for which they are authorized. (c) Permission authorization: A subject can exercise a permission only if the permission is authorized for the subject's active role. This rule ensures that users can exercise only permissions for which they are authorized. Following are the advantages of using RBAC : (a) It gives a granular visibility that is needed to securely support organizations working environment. It restricts access to sensitive information thereby reducing the potential of data breach. (b) It ensures that the users have what they need and nothing more. This keeps the network safe.
An ACL is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file. Likewise, the ability for different types of communication to pass a network device can be controlled by ACLS. ACLS can be created over systems or routers or firewalls.