Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Security in computing Authorization, Cheat Sheet of Computer Security

The concept of authorization and its types. Authorization is a security mechanism that determines user privileges or access levels related to system resources. It is preceded by authentication for user identity verification. three types of authorization: user rights, role-based authorization, and access control lists. It also explains the advantages of using role-based authorization. useful for students studying computer security and related fields.

Typology: Cheat Sheet

2021/2022

Available from 02/01/2023

ashrat-ali-33
ashrat-ali-33 🇮🇳

3 documents

1 / 3

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Authorization
Authorization is a security mechanism used to determine user privileges
or access levels related to system resources, including computer
programs, files, services, data and application features.
Authorization is normally preceded by authentication for user identity
verification.
System administrators are typically assigned permission levels covering
all system and user resources.
There are a variety of types of authorization systems, including user
rights, role-based authorization, access control lists, and rule-based
authorization.
Types Of Authorization
1. User Rights
User rights is a security feature that controls that user can use which
resources and what actions can he perform over those resources.
Privileges or user rights are different from permissions.
A systems administrator assigns a permission to let a user access a
resource and assigns a right to let a user perform a task which affects
the entire system.
Other user rights are implicit and are rights that are granted to default
groups that are created by the operating system instead of by
administrators. These rights cannot be removed.
In the typical implementation of a UNIX system, implicit privileges are
granted to the root account. This account is authorized to do anything
on the system.
On some UNIX systems, system administrators can grant certain users
the right to use specific commands as root, without issuing them the
root password. An application that can do this, and which is in the public
domain, is called sudo.
pf3

Partial preview of the text

Download Security in computing Authorization and more Cheat Sheet Computer Security in PDF only on Docsity!

Authorization

 Authorization is a security mechanism used to determine user privileges or access levels related to system resources, including computer programs, files, services, data and application features.  Authorization is normally preceded by authentication for user identity verification.  System administrators are typically assigned permission levels covering all system and user resources.  There are a variety of types of authorization systems, including user rights, role-based authorization, access control lists, and rule-based authorization.

Types Of Authorization

1. User Rights

 User rights is a security feature that controls that user can use which resources and what actions can he perform over those resources.  Privileges or user rights are different from permissions.  A systems administrator assigns a permission to let a user access a resource and assigns a right to let a user perform a task which affects the entire system.  Other user rights are implicit and are rights that are granted to default groups that are created by the operating system instead of by administrators. These rights cannot be removed.  In the typical implementation of a UNIX system, implicit privileges are granted to the root account. This account is authorized to do anything on the system.  On some UNIX systems, system administrators can grant certain users the right to use specific commands as root, without issuing them the root password. An application that can do this, and which is in the public domain, is called sudo.

2. Role Based Authorization (RBAC)

 RBAC is a security approach of restricting system access to authorized users. Within organization, roles are created for various job functions.  The permissions to perform certain operations are assigned to specific roles  Users are assigned particular roles, and through those role assignments they acquire the permissions needed to perform particular system functions. Following are the three primary rules are defined for RBAC : (a) Role assignment: A subject can exercise a permission only if the subject has selected or been assigned a role. (b) Role authorization: A subject's active role must be authorized for the subject. This rule ensures that users can take on only roles for which they are authorized. (c) Permission authorization: A subject can exercise a permission only if the permission is authorized for the subject's active role. This rule ensures that users can exercise only permissions for which they are authorized. Following are the advantages of using RBAC : (a) It gives a granular visibility that is needed to securely support organizations working environment. It restricts access to sensitive information thereby reducing the potential of data breach. (b) It ensures that the users have what they need and nothing more. This keeps the network safe.

3. Access Control Lists (ACLS)

 An ACL is a table that tells a computer operating system which access rights each user has to a particular system object, such as a file directory or individual file.  Likewise, the ability for different types of communication to pass a network device can be controlled by ACLS. ACLS can be created over systems or routers or firewalls.