May
09
CISSP Concepts
Domain Reference: Access Control
Biometrics Report:
– Type I Errors: Authorized Individuals were incorrectly rejected
– Type II Errors: Unathorized Individuals were incorrectly granted access.
SESAME: Secure European System For Applications In a Multivendors Enviroment
– Technology bult upon the Kerberos foundation.
– SESAME provides different capabilities and uses public key criptography
– SESAME differs from Kerberos in that it uses PACS (Privileged Attribute Certificate) for authentication.
– Instead of the Kerberos Tickets Exchange Methodology.
Access Controls Models
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC
- Role-Based Access Control (RBAC)
Information Technology Security Evaluation Criteria (ITSEC): http://en.wikipedia.org/wiki/ITSEC
Common Criteria for Information Technology Security Evaluation (CC): http://en.wikipedia.org/wiki/Common_Criteria