Unit 3 Css
Unit 3 Css
Unit 3 Css
Access Control
• Access control is the process of identifying a person and determining their level of
security access to either electronic systems or physical sites based on the policies
and procedures set by the organization. Modern access control systems identify a
person, authenticate them by looking at their identification, then give that person
only the key to the door or digital resource that they need to access.
• Access is granted using a set of steps to make sure this user can access the requested
resources. These steps are typically:
• Identification
• Authentication
• Authorization
Types of Access Control
Access control types include:
• Administrative
• Physical
• Technical
Administrative Access Control
• Administrative access control sets the access control policies and procedures for the
whole organization, defines the implementation requirements of both physical and
technical access control, and what the consequences of non-compliance will be.
Some examples are: supervisory structure, staff and contractor controls, information
classification, training, auditing, and testing.
Physical Access Control
• Physical access control is critical to an organizations security and applies to the
access or restriction of access to a place such as property, building or room. Some
examples are: fences, gates, doors, turnstiles, etc. using locks, badges, biometrics
(facial recognition, fingerprints), video surveillance cameras, security guards, motion
detectors, mantrap doors, etc. to allow access to certain areas.
Technical or Logical Access Control
• Technical or logical access control limits connections to computer networks, system
files, and data. It enforces restrictions on applications, protocols, operating systems,
encryptions mechanisms, etc.
• In today's increasingly digital world, modern access control systems combine both
administrative, physical and technical access control to limit access to sensitive data
and physical locations, providing a much higher level of security. Some examples are:
access control lists, intrusion detection systems, and antivirus software.
Access Control Models
• How does someone grant the right level of permission to an individual so that they
can perform their duties? Access control models define how permissions are
assigned.
• Access control models have four flavours:
• Mandatory Access Control (MAC)
• Role Based Access Control (RBAC)
• Discretionary Access Control (DAC)
• Rule Based Access Control (RBAC)
3. Layout Process – Once the render tree is constructed, the rendering engine
recursively goes through the HTML elements in the tree and figure out where they
should be placed on the screen. This starts at the top left in position 0,0 and
elements and attributes are mapped to coordinates on the screen.
4. Painting – Each node (branch) of the render tree is drawn out on the screen by
communicating with the Operating System Interface which contains designs and
styles for how UI elements should look.
• NOTE:Server-side rendering (SSR) is a method of providing pre-generated HTML as a
response to an HTTP request. For example, the content of this website is pre-built
from source files. These files are converted into HTML pages and uploaded into
an HTTP hosting server.
Findings Vulnerabilities
• To find security vulnerabilities on the business’ network, it is necessary to have an
accurate inventory of the assets on the network, as well as the operating systems
(OSs) and software these assets run. Having this inventory list helps the organization
identify security vulnerabilities from obsolete software and known program bugs in
specific OS types and software.
• Without this inventory, an organization might assume that their network security is
up to date, even though they could have assets with years-old vulnerabilities on
them. Also, if a new security protocol is applied to assets on the network to close
security gaps, but there are unknown assets on the network, this could lead to
uneven protection for the organization.
• For example, say that Servers A, B, and C get updated to require multi-factor
authentication, but Server D, which was not on the inventory list, doesn’t get the
update. Malicious actors could use this less-secure server as an entry point in an
attack. Breaches have occurred in this manner before. As noted by The New York
Times in an article about a major data breach affecting JPMorgan Chase bank, “Most
big banks use a double authentication scheme, known as two-factor authentication,
which requires a second one-time password to gain access to a protected system.
But JPMorgan’s security team had apparently neglected to upgrade one of its
network servers with the dual password scheme.”
• When it comes to finding security vulnerabilities, a thorough network audit is
indispensable for success.
• Penetration testing is highly useful for finding security vulnerabilities. However, it
isn’t the only method companies should use. General steps of a penetration test
usually involve:
• Getting a “white hat” hacker to run the pen test at a set date/time.
• Auditing existing systems to check for assets with known vulnerabilities.
• The “hackers” running simulated attacks on the network that attempt to exploit
potential weaknesses or uncover new ones.
• The organization running its incident response plan (IRP) to try and contain the
“attacks” simulated during penetration testing.
• Another tool for identifying potential issues is the threat intelligence framework.
This framework helps your organization:
• Define what it needs to protect.
• Set goals for overall network security.
• Identify primary threat sources.
• Refine cyber security protections.
• Choose appropriate threat intelligence feeds to monitor new and emerging cyber
threats and attack strategies.
Secure Development
• Secure development is a practice to ensure that the code and processes that go
into developing applications are as secure as possible. Secure development entails
the utilization of several processes, including the implementation of a Security
Development Lifecycle (SDL) and secure coding itself.
• The Security Development Lifecycle (SDL) is a software development security
assurance process consisting of security practices grouped by six phases: training,
requirements & design, construction, testing, release, and response.
• Secure development can be incorporated into both a traditional software
development lifecycle and the rapid pace agile development.
• One of the important steps in secure development is integrating testing tools and
services such as Vera code into the software development lifecycle. These tools
allow developers to model an application, scan the code, check the quality and
ensure that it meets regulations. Automated secure development testing tools help
developers find and fix security issues. Secure development services like Vera code
also offer secure development training so that developers can become certified in
secure development and gain further education and insight into issues that they may
have created.
The most important reasons to adopt SDL practices are:
• Higher security. In SDL, continuous monitoring for vulnerabilities results in better
application quality and mitigation of business risks.
• Cost reduction. In SDL, early attention to flaws significantly reduces the effort
required to detect and fix them.
• Regulatory compliance. SDL encourages a conscientious attitude toward security-
related laws and regulations. Ignoring them may result in fines and penalties, even if
no sensitive data is lost.
SDL also provides a variety of side benefits, such as:
• Development teams get continuous training in secure coding practices.
• Security approaches become more consistent across teams.
• Customers trust you more, because they see that special attention is paid to their
security.
• Internal security improves when SDL is applied to in-house software tools.
Secure development includes following phases:
• Planning and requirements
• Architecture and design
• Test planning
• Coding
• Testing and results
• Release and maintenance
• Generally speaking, a secure SDLC is set up by adding security-related activities to an
existing development process. For example, writing security requirements alongside
the collection of functional requirements, or performing an architecture risk analysis
during the design phase of the SDLC.
• Many secure SDLC models have been proposed. Here are a couple of them:
• MS Security Development Lifecycle (MS SDL): One of the first of its kind, the MS SDL
was proposed by Microsoft in association with the phases of a classic SDLC.
• NIST 800-64: Provides security considerations within the SDLC. Standards were
developed by the National Institute of Standards and Technology to be observed by
US federal agencies.