当前位置:网站首页>2022 information security engineer examination knowledge point: access control
2022 information security engineer examination knowledge point: access control
2022-06-23 23:37:00 【weixin_ forty-six million six hundred and nineteen thousand two】
I have arranged for you 2022 Knowledge points of information security engineer examination in : Access control , I hope it will be helpful for you to prepare for the information security engineer exam .
Access control
【 Test method analysis 】
This knowledge point is mainly to examine the contents related to access control .
【 Key points analysis 】
1. Role based access control design , The basic idea is this , Various permissions for system operation are not directly granted to specific users , Instead, a role set is created between the user set and the permission set .
Each role corresponds to a corresponding set of permissions , To simplify user rights management , Reduce system overhead .
2.Kerberos agreement : In an open distributed network environment , Users access the services provided on the server through the workstation . The server should be able to restrict the access of unauthorized users and authenticate requests for services .
The workstation cannot be trusted by the network service that it can correctly identify users , That is, there are three threats to the workstation : A user on a workstation may impersonate another user to operate ;
A user may change the network address of a workstation , So as to pretend to work as another workstation ;
A user may eavesdrop on the information exchange of others , And replay the attack to gain access to a server or interrupt the operation of the server .
The above problems can be attributed to the fact that an unauthorized user can obtain services or data that he / she does not have permission to access .
Kerberos Is a standard network identity authentication protocol , It aims to provide “ Identity Authentication ”. It is based on trusted third parties , It is like a broker that centrally authenticates users and issues electronic identities .
3.Kerberos Requirements that the system should meet :① Security ;② reliable ;③ transparent ;④ Telescopic .
4.Kerberos Design ideas and problems : Use one ( Or a group ) Independent authentication server (Authentication Server,AS), For users in the network (C) Provide identity authentication services ;
Authentication server (AS), Household registration order issued by AS Save in database ;
AS With each server (V) Share a secret key (Kv)( Has been safely distributed ).
The above agreement problem is : Password plaintext transmission will be eavesdropped .
Validity of the instrument ( Used multiple times ).
Access to multiple servers requires multiple ticket applications ( That is, the password is used more than once ).
Solve the above problems ,Kerberos The protocol uses ticket reuse and introduces a ticket license server (Tickert Granting Server,TGS).
5. Password guessing techniques include :① brute force( Violent attack );
② Character frequency analysis ;
③ Rainbow watch ;
④Dictioingary Attack( Dictionary attack );
⑤ Password guessing based on probability ;
⑥ JTR:John the Ripper It is one of the most popular password cracking tools , Open source software , It can be downloaded for free on its website ;
⑦HASHCAT:HashCat It is the fastest in the world CPU Password cracking tool .
6. User identity authentication is the first security line of information system , user name — Password mechanism is the most commonly used method in identity authentication . But the password mechanism is easy to understand 、 Easy to use and easy to implement , This makes password mechanism still an important method of user authentication in the future .
【 For reference 】
Understand and understand relevant knowledge points .
边栏推荐
- The Sandbox 归属周来啦!
- 堡垒机安装pytorch,mmcv,mmclassification,并训练自己的数据集
- MySQL transaction isolation
- STM32-------外部中斷
- 项目中常用到的 19 条 MySQL 优化
- Aicon2021 | AI technology helps content security and promotes the healthy development of Internet Environment
- C# 读取内存条占用大小,硬盘占用大小
- Is Everbright futures safe? What do I need to open an account?
- 开发协同,高效管理 | 社区征文
- Activity的onSaveInstanceState回调时机
猜你喜欢

数据解读!理想L9冲刺「月销过万」,从BBA手中抢份额

PyQt5_QTableWidget分页单选右键菜单控件

Why do MySQL indexes use b+ trees at the bottom? After reading this article, you can easily handle the interview.

Bitmap load memory analysis

STM32-------定时器

The sandbox and bayz have reached cooperation to jointly drive the development of metauniverse in Brazil
Androidkotlin comprehensive and detailed class usage grammar learning guide

ORB_SLAM3环境搭建及demo演示

嵌入式接口之TIM定时器与NVIC的STM32模板库函数的一些解释

STM32------ADC(电压检测)
随机推荐
Data interpretation! Ideal L9 sprints to "sell more than 10000 yuan a month" to grab share from BBA
AIX system monthly maintenance check (I)
Graph theory (tree diameter)
抖音支付十万级 TPS 流量发券实践
ARouter 组件之间跳转需免混淆
STM32 ------ external interrupt
短视频挺进在线音乐腹地
AIX系统月维护查什么(二)
Preliminary understanding of 3D printing and laser cutting process
The Sandbox 与 BAYZ 达成合作,共同带动巴西的元宇宙发展
HAOGE's blog Road
[Xilinx ax7103 microbalze Learning Notes 6] MicroBlaze custom IP core packaging experiment
The 12 SQL optimization schemes summarized by professional "brick moving" old drivers are very practical!
Go language core 36 lectures (go language practice and application 23) -- learning notes
TDD development mode process recommendation
AIX系统月维护查什么(一)
Construction of cache stack FIFO in different application scenarios for PLC data operation series (detailed algorithm explanation)
2022年信息安全工程师考试知识点:访问控制
Install using snap in opencloudos NET 6
Kotlin set list, set, map operation summary