SlideShare a Scribd company logo
1 of 10
Domain 3 – Access Control
Concepts
3.1: Access Control Concepts
3.2: Physical access controls
3.3: Logical access controls
Waleed Elnaggar
https://www.youtube.com/naggaracademy
Security Controls
https://www.youtube.com/naggaracademy
Security controls are countermeasures or safeguards used to reduce the chances that a
threat will exploit a vulnerability
Subjects & Objects
https://www.youtube.com/naggaracademy
 A subject is an entity that requires access to system
resources (human, batch job, application, etc.)
 An object is a resource to which access must be
controlled
 An access control rule specifies the rights of a
different types of subjects (user, group, role, or
organization) to access objects
Defense in Depth
https://www.youtube.com/naggaracademy
Defense in depth is a strategy that leverages
multiple security measures to protect an
organization's assets. The thinking is that if
one line of defense is compromised,
additional layers exist as a backup to ensure
that threats are stopped along the way.
Least Privilege
https://www.youtube.com/naggaracademy
The principle of least privilege is a security
concept in which a user is given the minimum
levels of access or permissions needed to
perform their job
Need to Know
https://www.youtube.com/naggaracademy
Access to data should only be granted when
it is necessary to fulfill specific tasks or
responsibilities.
Privileged Access Management (PAM)
https://www.youtube.com/naggaracademy
An identity security solution that helps protect
organizations against cyber-threats by
monitoring, detecting, and preventing
unauthorized privileged access to critical
resources
Segregation of Duties
https://www.youtube.com/naggaracademy
The concept of having more than one person
required to complete a task.
An administrative control used by organizations to
prevent fraud, sabotage, theft, misuse of information,
and other security compromises.
Collusion occurs when people
responsible for different aspects of a
segregated process decide to come
together to deliberately override the
controls for their own benefit
Provisioning
https://www.youtube.com/naggaracademy
https://www.youtube.com/naggaracademy

More Related Content

Similar to Access Control Concepts Domain 3 Physical Logical Controls

General Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxGeneral Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxbudbarber38650
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating Systemsohaildanish
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfdatabase-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfDr Amit Phadikar
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computingManoj VNV
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
Nw sec
Nw secNw sec
Nw secshivz3
 
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdfUNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdfKavitaShinde26
 
Ch18 OS
Ch18 OSCh18 OS
Ch18 OSC.U
 

Similar to Access Control Concepts Domain 3 Physical Logical Controls (20)

Protection
ProtectionProtection
Protection
 
Chapter 14 - Protection
Chapter 14 - ProtectionChapter 14 - Protection
Chapter 14 - Protection
 
General Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docxGeneral Security ConceptsChapter 2Principles of Comput.docx
General Security ConceptsChapter 2Principles of Comput.docx
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 
Protection and security
Protection and securityProtection and security
Protection and security
 
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdfdatabase-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
database-security-access-control-models-a-brief-overview-IJERTV2IS50406.pdf
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 
Gs Ch1
Gs Ch1Gs Ch1
Gs Ch1
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 
Nw sec
Nw secNw sec
Nw sec
 
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdfUNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
UNIT 3- DATABASE INTEGRITY AND SECURITY CONCEPTS (1).pdf
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
Ch18 OS
Ch18 OSCh18 OS
Ch18 OS
 
OSCh18
OSCh18OSCh18
OSCh18
 
OS_Ch18
OS_Ch18OS_Ch18
OS_Ch18
 
Unit 7
Unit 7Unit 7
Unit 7
 

More from Waleed Elnaggar

CC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdfCC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdfWaleed Elnaggar
 
CC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdfCC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdfWaleed Elnaggar
 
CC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdfCC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdfWaleed Elnaggar
 
CC 2-1 Incident response.pdf
CC 2-1 Incident response.pdfCC 2-1 Incident response.pdf
CC 2-1 Incident response.pdfWaleed Elnaggar
 
CC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdfCC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdfWaleed Elnaggar
 
CC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdfCC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdfWaleed Elnaggar
 
CC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdfCC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdfWaleed Elnaggar
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project ManagementWaleed Elnaggar
 
PMP Application - Step by Step
PMP Application - Step by StepPMP Application - Step by Step
PMP Application - Step by StepWaleed Elnaggar
 
Shopping World - A Project Planning Case
Shopping World - A Project Planning CaseShopping World - A Project Planning Case
Shopping World - A Project Planning CaseWaleed Elnaggar
 

More from Waleed Elnaggar (12)

CC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdfCC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdf
 
CC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdfCC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdf
 
CC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdfCC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdf
 
CC 2-1 Incident response.pdf
CC 2-1 Incident response.pdfCC 2-1 Incident response.pdf
CC 2-1 Incident response.pdf
 
CC 1-5 Governance.pdf
CC 1-5 Governance.pdfCC 1-5 Governance.pdf
CC 1-5 Governance.pdf
 
CC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdfCC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdf
 
CC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdfCC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdf
 
CC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdfCC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdf
 
CC 0-1 Introduction.pdf
CC 0-1 Introduction.pdfCC 0-1 Introduction.pdf
CC 0-1 Introduction.pdf
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
 
PMP Application - Step by Step
PMP Application - Step by StepPMP Application - Step by Step
PMP Application - Step by Step
 
Shopping World - A Project Planning Case
Shopping World - A Project Planning CaseShopping World - A Project Planning Case
Shopping World - A Project Planning Case
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Access Control Concepts Domain 3 Physical Logical Controls