09 10 2025 - rtji0/Arthur-Tech-Journal GitHub Wiki

Access Control

  • Locking your stuff, computers/room/datacenter/building
  • Logins, passwords
  • Encryption
  • Digital Signatures

Who can access the data?

  • Make sure admins don't use privilege accounts when not necessary

Methods for protecting data integrity

  • Checksum -> Data entered, then hash algorithm computes a checksum
  • If there is no data integrity loss, checksum is the same at both ends (before and after transmission or dl)

Different Items to AC

  • Network Access - needs to be restricted, monitored
  • System Access - shared devices
  • Data Access - access and modifying files docs, and databases - should be restricted and monitored

Layers

  • Admin Policies must first grant access
  • Then Technical Controls
  • And then Physical Controls

Administrative Access Control

  • Main driver for AC in organization
  • Ensured through policies and procedures

Access Rights

  • Certain info must only be "read" by people so that they are aware of the info

Policies

  • Hiring
  • Disciplinary
  • Employee Termination
  • User registration for computer access

Technical Controls

Physical Controls

  • Network Segregation
  • Perimeter Security

Access Control Strategy

  • Discretionary Access Control (DAC) - Perms and access based in owner's discretion, "need-to-know" access based on Access Control Lists (ACLs)
  • Mandatory Access Controls (MAC) - Maintained by someone higher authority/clearance, data owner has no choice on access lvl
  • Role-Based Access Control (RBAC) - AC granted based on roles and responsibilities based on job
  • Attribute Based Access Control (ABAC) - Stuff you have like keys and the like

Network ACLs

AAA (Authentication, Authorization, Accounting) - Framework for controlling users access to computer resources

  • Implementation can look like passwords, time restrictions, single access, resource access

ID and Access Management (IDAM)

  • Single ID across multiple accounts