Isnis Unit2
Isnis Unit2
Guessing password
A ackers can guess valid password easily so password selec on is cri cal issue
A ackers following two guessing strategies:
o Exhaus ve search
A acker tries all possible combina ons of valid symbols ll certain
length.
E.g. Brute Force A ack
o Intelligent search
A acker searches password with the help of user’s personal
informa on like -name, birth date, family members name, phone
number, etc
Many mes, a acker tries popular passwords
E.g. Dic onary a ack(trying all passwords from dic onary)
Protec on techniques for users:
1. Default password:
b. if such password is not changed by admin, it helps a acker to enter into the
system easily
2. Length of password
Password a acks
1. Piggybacking
Following closely behind a person who has just
used their access card or PIN to gain physical
access to a room or building
In this manner a acker can gain access to the
facility without knowing the access code or
without access card
2. Shoulder Surfing
A ackers posi on themselves in such a way that
he is able to observe the authorised user
entering the correct access code
This a ack used observa on techniques
Both a acks are easily possible by simple
techniques of following and observing someone
closely
3. Dumpster diving
a type of passive a ack where a hacker or
a acker searches through trash for sensi ve
informa on
not only trash but access codes or passwords
wri en on s cky notes
innocent informa on like- phone list calendar or
organiza onal order can be used to assist
a acker to gain access to network
to prevent this a ack:- company should
establish a disposal policy
where all papers, including printouts
are shredded in crosscut shredder
before being recycled
all storage media is erased
all staff is educated about the danger
of untracked trash
Defini on: A ackers need certain amount of
informa on before a ack. If a acker is in
surrounding area of the target, one common
place to find informa on is to go through
target’s trash to find useful informa on. This
process of going through target’s trash is known
as Dumpster Diving
If a ackers are lucky and targets security is
poor, they may find user ID and passwords
When password is changes users discard the
paper where password was wri en without
shredding it and dumpster luckily gets the clue
Even though a acker doesn’t get password
directly they can find the name of the employee
and guess ID of the user
Biometrics
Types of Biometrics
1. Fingerprint
Fingerprint is the pa ern of ridges and furrows on the surface of the finger p and it
is unique across the en re human popula on
Fingerprint involves a finger size iden fica on sensor with very low-cost biometric
chip
Automated fingerprint recogni on and matching system extract a number of features
from fingerprint for storage as a numerical subs tute for the full fingerprint pa ern
This system is specifically a ached to specific computer or network assets
Limita ons:
o A person’s physical changes cannot be considered
o Cost of computer hardware and so ware can be expensive
o Fingerprint scanner can some mes lead to false rejec on or false acceptance
o Fingerprint can vary with dryness of skin or age
2. Hand Prints
Hand prints are most appropriate for fixed physical loca on requiring very high
assurance to iden fy
It combines hand biometric with 5 different fingerprint biometrics
Iden fies features of hands like – shape, length, width of fingers
Handprints are used for tradi onal applica ons like- data rooms, sensi ve office
zones/buildings, na onal security/intelligence facili es and vaults
3. Re na
Re na Scan involves examina on of the unique pa erns on the back of a person’s
eye
Re na pa ern is formed by veins beneath the re nal surface
It is unique and suitable for iden fica on
Re na biometric system obtains a digital image of re nal pa ern by projec ng a low
intensity beam of visual or infrared light into the eye
4. Voice/Speech pa ern
This type of verifica on is done without any specialized recording device
Voiceprint recogni on is completely a part of algorithms and analysis so ware
This mechanism is able to use phone-based applica on e.g. Voice response system
and me and card entry
Use of voice verifica on will increase possibility to protect remote data repor ng
applica ons which will be more helpful in criminal jus ce and healthcare industry
5. Signature and Wri ng Pa erns
Every individual as – unique handwri ng
Reflected in signature frequently wri en sequence
Single user can have – mul ple – non-iden cal signatures
This makes computer representa on of signature complicated
Biometric verifica on of signature/handwri ng is different that simple signature
capture pads
Simple signature capture pad:
o Records an image of what person wrote
Biometric enabled capture pad:
o Records the pressure
o Distance of strokes
o Speed of wri ng
This data verifies originally enrolled person
Uses: financial and legal communi es
6. Keystrokes
Art and science of recognizing typing pa erns
This biometric type arising since past 2 decades
Cheaper to implement
Hardware required: only keyboard
Data collec on
o Through so ware
o Virtually possible
For each keystroke press me and release me is considered
Physical presence of user not required
Authoriza on
Goals of Authoriza on
Access control
Defini ons
Access control: ability to specify, to control and to limit the access of the host system
or applica on in terms of accessibility, integrity, confiden ality
Authen ca on: verifica on that the creden als of users or other system are valid
Authen ca on mechanism
Purpose of access control is to limit the ac ons or opera ons that authorised user
can perform
1. Principle of least privilege: if not officially assigned user should not be able to access
that resource no default access to all
Policies: are high level guidelines which determines how accesses are controlled and
access decisions determined
Mechanism: are low level so ware and hardware func ons which can be configured to
implement the policy.
1. Access control Matrix (ACM) – provides the simplest framework for showing the
process.
In a large system the matrix will be huge i.e. big company big matrix.
2. Access Control List (ACL) – it contains subject that have access rights to par cular
object.
It is a list that contains subjects having access rights to a par cular object
Accesses provided- read, write, execute same as ACM
List will iden fy not only subject but also specific access to the object
Easy to revoke exis ng accesses by replacing empty ACL
It is important to examine ACL while reviewing system
ACL- small in size- stored in few bits
Used in computer system or network system
in order