itt3 its acl

Post on 08-Jun-2015

130 Views

Category:

Education

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

  • 1. Access control ITT32012 Autumn Morten Bo Nielsen mon@eal.dk 1/11

2. Getting accessApt-get install UserAndPasswdHandlerand were done for Today go home Morten Bo Nielsen mon@eal.dk2/11 3. Once we know who you are....Confidentiality Integrity Availability Morten Bo Nielsen mon@eal.dk 3/11 4. Tripple A AuthenticationAuthorizationAccounting Morten Bo Nielsen mon@eal.dk 4/11 5. Something you know: RADIUSWe are doing RADIUS (or something similar) onthe EAL wireless. What is RADIUS? How does it relate to tripple A? Do a rough diagram of connecting wirelesslyto the internet.Morten Bo Nielsen mon@eal.dk5/11 6. AuthenticationThe big question:How do you tell you are you?And you have many identities Yes, this is Dr. Who! (from the remake) Morten Bo Nielsen mon@eal.dk6/11 7. Authentication 1-, 2-, 3-factorauthentication Are, have, know. Examples, please. RSA got hackedfor their token seeds.Morten Bo Nielsen mon@eal.dk7/11 8. AuthorizationAllow or deny access Equipment Location Data Services Etc.Morten Bo Nielsen mon@eal.dk 8/11 9. Accounting Resource usage Logs Forensics After-the-fact Investigations Morten Bo Nielsen mon@eal.dk9/11 10. Exercise: Kerberos How does it work? Describe usingTripple A Do a rough diagramCerberus guarding the entrance to the third circleof hell (Gluttony) according to the Divine comedy.(and that is completely unrelated, but cool anyway)Morten Bo Nielsen mon@eal.dk 10/11 11. Credits & licencesContent by Morten Bo Nielsen License: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. (http://creativecommons.org/licenses/by-nc-sa/3.0/)EAL logo might be an issue, please check before you use itImages: Green checkmark, Bean counter, Dr Who, Dante, Password, Iris, RSA token, Access denied. Morten Bo Nielsen mon@eal.dk11/11

top related