SlideShare a Scribd company logo
1 of 94
Access Control Part 2    Access Control
Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Authentication Part 2    Access Control
Who Goes There? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Something You Know ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Trouble with Passwords ,[object Object],[object Object],Part 2    Access Control
Why Passwords? ,[object Object],[object Object],[object Object],Part 2    Access Control
Keys vs Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Good and Bad Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Attacks on Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Password Retry ,[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Password File ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Dictionary Attack ,[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Password File ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Password Cracking: Do the Math ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Password Cracking ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Other Password Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Password Cracking Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Biometrics Part 2    Access Control
Something You Are ,[object Object],[object Object],Part 2    Access Control  Are   Know Have ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why Biometrics? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Ideal Biometric ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Biometric Modes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Enrollment vs Recognition ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Cooperative Subjects ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
End of class 8 Part 2    Access Control
Biometric Errors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Fingerprint History ,[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Fingerprint History ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Fingerprint Comparison ,[object Object],[object Object],Part 2    Access Control  Loop (double) Whorl Arch
Fingerprint Biometric ,[object Object],[object Object],[object Object],Part 2    Access Control
Fingerprint Biometric ,[object Object],[object Object],Part 2    Access Control
Hand Geometry Part 2    Access Control  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hand Geometry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Iris Patterns ,[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Iris Recognition: History ,[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Iris Scan ,[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Measuring Iris Similarity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Iris Scan Error Rate Part 2    Access Control  distance distance Fraud rate : equal error rate 0.29 1 in 1.3  10 10 0.30 1 in 1.5  10 9 0.31 1 in 1.8  10 8 0.32 1 in 2.6  10 7 0.33 1 in 4.0  10 6 0.34 1 in 6.9  10 5 0.35 1 in 1.3  10 5
Attack on Iris Scan ,[object Object],[object Object],Part 2    Access Control  ,[object Object],[object Object]
Equal Error Rate Comparison ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Biometrics: The Bottom Line ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Something You Have ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
2-factor Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Web Cookies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Authorization Part 2    Access Control
Authentication vs Authorization  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Lampson’s Access Control Matrix ,[object Object],[object Object],Part 2    Access Control  OS Accounting program Accounting data Insurance data Payroll data Bob Alice Sam Accounting program R ead e X ecute Rx R --- --- RX Rx R RW RW RWX Rwx R RW RW RX Rx RW rite RW RW
Are You Allowed to Do That?  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Access Control Lists (ACLs) ,[object Object],[object Object],Part 2    Access Control  OS Accounting program Accounting data Insurance data Payroll data Bob Alice Sam Accounting program rx rx r --- --- rx rx r rw rw rwx rwx r rw rw rx rx rw rw rw
Capabilities (or C-Lists) ,[object Object],[object Object],Part 2    Access Control  OS Accounting program Accounting data Insurance data Payroll data Bob Alice Sam Accounting program rx rx r --- --- rx rx r rw rw rwx rwx r rw rw rx rx rw rw rw
ACLs  vs   Capabilities ,[object Object],[object Object],Part 2    Access Control  Access Control List Capability file1 file2 file3 file1 file2 file3 r --- r Alice Bob Fred w r --- rw r r Alice Bob Fred r w rw --- r r r --- r
ACLs vs Capabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Multilevel Security (MLS) Models Part 2    Access Control
Classifications and Clearances ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Clearances and Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Subjects and Objects ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Multilevel Security (MLS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
MLS Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
MLS Security Models ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Bell-LaPadula ,[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
End of Class 9 Part 2    Access Control
Covert Channel Part 2    Access Control
Covert Channel ,[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Covert Channel Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Covert Channel Example Part 2    Access Control  Alice: Time: Create file Delete file Create file Delete file Bob: Check file Check file Check file Check file Check file Data: 1 0 1 0 1
Covert Channel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Covert Channel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Covert Channel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Real-World Covert Channel ,[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Real-World Covert Channel ,[object Object],[object Object],[object Object],Part 2    Access Control  A. Covert_TCP sender C. Covert_TCP   receiver B . Innocent server SYN Spoofed source:  C Destination:  B SEQ :  X ACK  (or  RST ) Source:  B Destination:  C ACK :  X
Inference Control Part 2    Access Control
Inference Control Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Inference Control and Research ,[object Object],[object Object],[object Object],Part 2    Access Control
Naïve Inference Control ,[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Less-naïve Inference Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Inference Control: The Bottom Line ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
CAPTCHA Part 2    Access Control
Turing Test ,[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
CAPTCHA ,[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
CAPTCHA Paradox ,[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
CAPTCHA Uses? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
CAPTCHA: Rules of the Game ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Do CAPTCHAs Exist? ,[object Object],Part 2    Access Control  ,[object Object],[object Object]
CAPTCHAs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
CAPTCHA’s and AI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Firewalls Part 2    Access Control
Firewalls ,[object Object],[object Object],Part 2    Access Control  Internet Internal network Firewall
Firewall as Secretary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Firewall Terminology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control
Packet Filter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Part 2    Access Control  application transport network link physical
Packet Filter ,[object Object],[object Object],Part 2    Access Control  Action Source  IP Dest  IP Source  Port Dest  Port Protocol ,[object Object],Flag Bits Allow Inside Outside Any 80 HTTP Allow Outside Inside 80 > 1023 HTTP Deny All All All All All Any ACK All
End of class 10 Part 2    Access Control

More Related Content

What's hot

An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication IJMER
 
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSUSER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSpharmaindexing
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a Google
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...eSAT Journals
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password RequirementsJim Fenton
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemIJERA Editor
 
Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004
Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004
Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004Amish Patel
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 
Color Based Authentication Scheme for Publically Disclosable Entities
Color Based Authentication Scheme for Publically Disclosable EntitiesColor Based Authentication Scheme for Publically Disclosable Entities
Color Based Authentication Scheme for Publically Disclosable EntitiesIJERA Editor
 
Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004
Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004
Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004Amish Patel
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityUnlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityIJCSEA Journal
 
Frost & Sullivan: Moving Forward with Distributed Cryptography
Frost & Sullivan: Moving Forward with Distributed CryptographyFrost & Sullivan: Moving Forward with Distributed Cryptography
Frost & Sullivan: Moving Forward with Distributed CryptographyEMC
 
3d authentication system
3d authentication system3d authentication system
3d authentication systemRicha Agarwal
 

What's hot (20)

120 i143
120 i143120 i143
120 i143
 
An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication An Enhanced Security System for Web Authentication
An Enhanced Security System for Web Authentication
 
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKSUSER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
USER AUTHENTICATION DEFENSE AGAINST ONLINE DICTIONARY ATTACKS
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...Secure3 authentication for sensitive data on cloud using textual, chessboard ...
Secure3 authentication for sensitive data on cloud using textual, chessboard ...
 
Toward Better Password Requirements
Toward Better Password RequirementsToward Better Password Requirements
Toward Better Password Requirements
 
Final report
Final reportFinal report
Final report
 
An Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication SystemAn Improving Method of Grid Graphical Password Authentication System
An Improving Method of Grid Graphical Password Authentication System
 
Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004
Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004
Exploring Ethical Hacking - By Cyber Expert Amish Patel - 8690029004
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
Color Based Authentication Scheme for Publically Disclosable Entities
Color Based Authentication Scheme for Publically Disclosable EntitiesColor Based Authentication Scheme for Publically Disclosable Entities
Color Based Authentication Scheme for Publically Disclosable Entities
 
Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004
Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004
Introduction to Penetration Testing - By Cyber Expert Amish Patel - 8690029004
 
C0210014017
C0210014017C0210014017
C0210014017
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Unlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased SecurityUnlimited Length Random Passwords for Exponentially Increased Security
Unlimited Length Random Passwords for Exponentially Increased Security
 
1435488539 221998
1435488539 2219981435488539 221998
1435488539 221998
 
Frost & Sullivan: Moving Forward with Distributed Cryptography
Frost & Sullivan: Moving Forward with Distributed CryptographyFrost & Sullivan: Moving Forward with Distributed Cryptography
Frost & Sullivan: Moving Forward with Distributed Cryptography
 
J0704055058
J0704055058J0704055058
J0704055058
 
3d authentication system
3d authentication system3d authentication system
3d authentication system
 

Similar to Class 8, 9 and 10

<h1>slideShare</h1>access control.pptx
<h1>slideShare</h1>access control.pptx<h1>slideShare</h1>access control.pptx
<h1>slideShare</h1>access control.pptxkoanti abdu
 
Access Control authentication and authorization .pptx
Access Control authentication and authorization .pptxAccess Control authentication and authorization .pptx
Access Control authentication and authorization .pptxbirhanugirmay559
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thsamirapdcosden
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Kailas Patil
 
Cyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxCyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxAnandarajSathianatha
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)Hitoshi Kokumai
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfarestuimrozsm
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfjohn485745
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Controlidingolay
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger GiralFaurel
 
Journals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxJournals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxpriestmanmable
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hackingsamprada123
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 

Similar to Class 8, 9 and 10 (20)

<h1>slideShare</h1>access control.pptx
<h1>slideShare</h1>access control.pptx<h1>slideShare</h1>access control.pptx
<h1>slideShare</h1>access control.pptx
 
Access Control authentication and authorization .pptx
Access Control authentication and authorization .pptxAccess Control authentication and authorization .pptx
Access Control authentication and authorization .pptx
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222Volume 1 number-2pp-216-222
Volume 1 number-2pp-216-222
 
nullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric Systemnullcon 2011 - Penetration Testing a Biometric System
nullcon 2011 - Penetration Testing a Biometric System
 
Cyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxCyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptx
 
More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)More Issues on Digital Identity (24Feb2023)
More Issues on Digital Identity (24Feb2023)
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdf
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Information Security Principles - Access Control
Information Security  Principles -  Access ControlInformation Security  Principles -  Access Control
Information Security Principles - Access Control
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 
Journals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docxJournals The Journals should be a synopsis of ALL your required r.docx
Journals The Journals should be a synopsis of ALL your required r.docx
 
Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 

Class 8, 9 and 10

  • 1. Access Control Part 2  Access Control
  • 2.
  • 3. Authentication Part 2  Access Control
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20. Biometrics Part 2  Access Control
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. End of class 8 Part 2  Access Control
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Iris Scan Error Rate Part 2  Access Control distance distance Fraud rate : equal error rate 0.29 1 in 1.3  10 10 0.30 1 in 1.5  10 9 0.31 1 in 1.8  10 8 0.32 1 in 2.6  10 7 0.33 1 in 4.0  10 6 0.34 1 in 6.9  10 5 0.35 1 in 1.3  10 5
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Authorization Part 2  Access Control
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55. Multilevel Security (MLS) Models Part 2  Access Control
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63. End of Class 9 Part 2  Access Control
  • 64. Covert Channel Part 2  Access Control
  • 65.
  • 66.
  • 67. Covert Channel Example Part 2  Access Control Alice: Time: Create file Delete file Create file Delete file Bob: Check file Check file Check file Check file Check file Data: 1 0 1 0 1
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73. Inference Control Part 2  Access Control
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79. CAPTCHA Part 2  Access Control
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88. Firewalls Part 2  Access Control
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94. End of class 10 Part 2  Access Control