0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Identification and authentication are integral to an access control system. Identification is carried out by the user or service supplying the system with user IDs. Authentication is the process to obtain ID verification of the user or service requesting access. Both the sender and recipient can verify the other as a legitimate user with whom they’re trying to ...


The three types of access control offer different levels of protection, and each can be configured based on the needs of the organization. This affords the security administrator extensive discretionary control over security mechanisms and reinforces the organization’s security as a whole. The main objective of security control mechanisms is to prevent, identify, or recover from problems. Preventive controls ...


Password Authentication Protocol (PAP): a clear text exchange of username and password data. After a user dials in, a username request is sent. After a username is entered, a password request is sent out. All communications are transmitted in clear text with no encryption. PAP is a one-way authentication between the router and the host. Shiva Password Authentication Protocol (SPAP): ...


Most information systems are constructed with multiple systems, resources and data that users will require access to. Each necessitates access control which entails ongoing renewal of passwords, although users will often use the same password rather than creating numerous codes, or write them down to keep track of the information which can compromise security. Single sign-on handles this problem by ...


Access control requirements are varied therefore access control systems can be just as diverse. Generally, access control systems operate in two categories: Centralized access control Decentralized or distributed access control Based on the needs and environment of an organization, one system is more befitting than the other. A Centralized Access Control system keeps user IDs, rights, and permissions in ...


Attackers attempt a range of tactics and schemes to try to bypass or decode access control mechanisms, making access control one of the most vulnerable and targeted security mechanisms. Password Attacks Access control on most systems is achieved with a username and password. One of the weaknesses is users' lapse in maintaining password security, a habit hackers are well aware ...


Denial-of-Service (DoS) and Distributed Denial of Service (DDoS) attacks target and absorb resources to the extent that those resources or services can no longer be used. This is a more surreptitious form of attack as the ID of an authorized user isn’t required. These attacks usually occur during network connectivity & host availability tests. Here are some examples of DoS ...


A covert channel is a communication channel not normally used in system communications and is therefore not protected by the system’s security mechanisms. This makes it a vulnerability that could be exploited to corrupt a system’s security policy. The two common types of covert channels: Covert storage channels – these transfer data by modifying it on a resource, such as ...


Remote Authentication Dial-In User Service (RADIUS) and DIAMETER Remote Authentication Dial-In User Service (RADIUS) is a client/server-based system that supports authentication, authorization, and accounting (AAA) services for remote user access while safeguarding the system from unauthorized access. RADIUS organizes a centralized user administration by keeping record of all user profiles in one location that all remote services have access to. ...


Remote Authentication Dial-In User Service (RADIUS) is a client/server-based system that supports authentication, authorization, and accounting (AAA) services for remote user access while safeguarding the system from unauthorized access. RADIUS organizes a centralized user administration by keeping record of all user profiles in one location that all remote services have access to. To validate a RADIUS server, user credentials are ...