当前位置:网站首页>2022 information security engineer examination knowledge point: access control
2022 information security engineer examination knowledge point: access control
2022-06-23 23:37:00 【weixin_ forty-six million six hundred and nineteen thousand two】
I have arranged for you 2022 Knowledge points of information security engineer examination in : Access control , I hope it will be helpful for you to prepare for the information security engineer exam .
Access control
【 Test method analysis 】
This knowledge point is mainly to examine the contents related to access control .
【 Key points analysis 】
1. Role based access control design , The basic idea is this , Various permissions for system operation are not directly granted to specific users , Instead, a role set is created between the user set and the permission set .
Each role corresponds to a corresponding set of permissions , To simplify user rights management , Reduce system overhead .
2.Kerberos agreement : In an open distributed network environment , Users access the services provided on the server through the workstation . The server should be able to restrict the access of unauthorized users and authenticate requests for services .
The workstation cannot be trusted by the network service that it can correctly identify users , That is, there are three threats to the workstation : A user on a workstation may impersonate another user to operate ;
A user may change the network address of a workstation , So as to pretend to work as another workstation ;
A user may eavesdrop on the information exchange of others , And replay the attack to gain access to a server or interrupt the operation of the server .
The above problems can be attributed to the fact that an unauthorized user can obtain services or data that he / she does not have permission to access .
Kerberos Is a standard network identity authentication protocol , It aims to provide “ Identity Authentication ”. It is based on trusted third parties , It is like a broker that centrally authenticates users and issues electronic identities .
3.Kerberos Requirements that the system should meet :① Security ;② reliable ;③ transparent ;④ Telescopic .
4.Kerberos Design ideas and problems : Use one ( Or a group ) Independent authentication server (Authentication Server,AS), For users in the network (C) Provide identity authentication services ;
Authentication server (AS), Household registration order issued by AS Save in database ;
AS With each server (V) Share a secret key (Kv)( Has been safely distributed ).
The above agreement problem is : Password plaintext transmission will be eavesdropped .
Validity of the instrument ( Used multiple times ).
Access to multiple servers requires multiple ticket applications ( That is, the password is used more than once ).
Solve the above problems ,Kerberos The protocol uses ticket reuse and introduces a ticket license server (Tickert Granting Server,TGS).
5. Password guessing techniques include :① brute force( Violent attack );
② Character frequency analysis ;
③ Rainbow watch ;
④Dictioingary Attack( Dictionary attack );
⑤ Password guessing based on probability ;
⑥ JTR:John the Ripper It is one of the most popular password cracking tools , Open source software , It can be downloaded for free on its website ;
⑦HASHCAT:HashCat It is the fastest in the world CPU Password cracking tool .
6. User identity authentication is the first security line of information system , user name — Password mechanism is the most commonly used method in identity authentication . But the password mechanism is easy to understand 、 Easy to use and easy to implement , This makes password mechanism still an important method of user authentication in the future .
【 For reference 】
Understand and understand relevant knowledge points .
边栏推荐
- “山大地纬杯”第十二届山东省ICPC大学生程序设计竞赛
- What is an immunohistochemical experiment? Immunohistochemical experiment
- AIX system monthly maintenance check (I)
- 光大期货安全吗?开户需要什么东西?
- 保障特殊困难群体安全,广州民政全力做好三防工作
- Desai wisdom number - histogram (basic histogram): the way to celebrate father's day in 2022
- 图像分割-数据标注
- 有哪些劵商推荐?在线开户安全么?
- 企业网站的制作流程是什么?设计和制作一个网站需要多长时间?
- MySQL索引底层为什么用B+树?看完这篇文章,轻松应对面试。
猜你喜欢
随机推荐
Million message IM system technical points sharing
详解四元数
迪赛智慧数——柱状图(基本柱状图):2022年父亲节过节的方式
Androidkotlin comprehensive and detailed class usage grammar learning guide
Kotlin 集合List 、Set、Map操作汇总
Nlog详解
What is an applet container
Summary of cloud native pipeline tools
[JS reverse hundred examples] the first question of the anti crawling practice platform for netizens: JS confusion encryption and anti hook operation
MySQL事務隔離
The 12 SQL optimization schemes summarized by professional "brick moving" old drivers are very practical!
根据先序遍历和中序遍历生成后序遍历
Map集合的四种遍历
C WinForm custom progress bar ProgressBar
网站如何在Google建立索引
《阿里云天池大赛赛题解析》——O2O优惠卷预测
“山大地纬杯”第十二届山东省ICPC大学生程序设计竞赛
不同网络结构的特征也能进行对比学习?蚂蚁&美团&南大&阿里提出跨架构自监督视频表示学习方法CACL,性能SOTA!...
Bitmap加载内存分析
Unknown character set index for field ‘255‘ received from server.








![[design] 1359- how umi3 implements plug-in architecture](/img/f1/c4cb7715aff7f10d099e4f11b32c01.png)