0% found this document useful (0 votes)
15 views14 pages

Isnis Unit2

Chapter 2 discusses authentication and access control, emphasizing the importance of verifying user identity through methods such as passwords and multi-factor authentication (MFA). It outlines various techniques to enhance password security and the risks associated with password attacks, including guessing strategies and physical breaches like piggybacking and dumpster diving. Additionally, it covers biometric authentication methods and the principles of authorization and access control mechanisms to protect sensitive data.

Uploaded by

Aryan Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views14 pages

Isnis Unit2

Chapter 2 discusses authentication and access control, emphasizing the importance of verifying user identity through methods such as passwords and multi-factor authentication (MFA). It outlines various techniques to enhance password security and the risks associated with password attacks, including guessing strategies and physical breaches like piggybacking and dumpster diving. Additionally, it covers biometric authentication methods and the principles of authorization and access control mechanisms to protect sensitive data.

Uploaded by

Aryan Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Chapter 2

Authen ca on and access control

Iden fica on and Authen ca on


 Electronics User Authen ca on:
o This process verifies the iden ty of a user a emp ng to access system
electronically
o It ensures user is who they claim to be before gran ng access
o Various electronic authen ca on methods can be used to verify a user’s
iden ty from basic password to more advanced security measures that
incorporate mul factor authen ca on (MFA)
 Username and password
 Common method of iden fica on
 When user logged on to a computer, he performs 2 tasks
o Iden fica on: Enter username and password
o Authen ca on: prove that you are who claim to be
 A er entering username and password computer will compare this input against
entries stored in password file and login is successful if username and password is
valid
 Many systems count the failure login a empts and prevent or deny next a empt
when threshold has been reached
 User plays an important role in password protec on.
 If password is disclosed by telling someone or wri ng down in some place 
authen ca on is compromised
 Mul Factor Authen ca on (MFA)
 This method relies on 2 or more factors from 3 categories
o Something you know: password or PIN
o Something you have: OTP device, smartphone or security token
o Something you are: biometric iden fiers like fingerprints of facial
recogni on
 Use of login ID/Password is single factor authen ca on method
 ATM is example of Mul -Factor Authen ca on
 Token-Based Authen ca on
 Tradi onal method single layer security username password to grant access
 With increasing demands of security 2FA emerged with token-based authen ca on
 This reduces dependence on password -only system by adding addi onal layer of
security, enhancing overall protec on
 Token based authen ca on is a protocol that generates encrypted security tokens to
verify a user’s iden ty
 Upon successful authen ca on, the system generates a unique encrypted token,
gran ng the user access to the system or specific resource
 This token allows user to access these resources for a limited me without needing
to re-enter their username and password
 Authen ca on works through following process-
o Request
o Verifica on
o Token Submission
o Storage
o Expira on
 Biometrics –
 This authen ca on process is based on unique physical or behavioural characteris cs
o Physical: fingerprints, facial recogni on, re na scans
o Behavioural: voice recogni on, typing pa erns

Guessing password
 A ackers can guess valid password easily so password selec on is cri cal issue
 A ackers following two guessing strategies:
o Exhaus ve search
 A acker tries all possible combina ons of valid symbols ll certain
length.
 E.g. Brute Force A ack
o Intelligent search
 A acker searches password with the help of user’s personal
informa on like -name, birth date, family members name, phone
number, etc
 Many mes, a acker tries popular passwords
 E.g. Dic onary a ack(trying all passwords from dic onary)
 Protec on techniques for users:
1. Default password:

a. many mes, default accounts like Admin have default password

b. if such password is not changed by admin, it helps a acker to enter into the
system easily

2. Length of password

a. To avoid exhaus ve search set a par cular length of password

b. E.g. in UNX system length of password id 8 characters long

3. Format of password: password should have at least combina on of the following:

a. One or more upper case le ers(A-Z)

b. One or more lower case le ers(a-z)

c. One or more numerals (0-9)

d. One or more special characters or punctua on marks (! @#$%&*,.:;?)

4. Avoid obvious (easily seen or understood; clear) password:

a. A acker may have list of popular passwords

b. They can use dic onary to catch obvious passwords

c. Hence avoid such kind of passwords

 Techniques to improve password security:


1. Password checkers
1. This system periodically runs its own password cracker
program to fine out guessable or weak passwords
2. If such passwords are found system cancels it
3. System can no fy or prevent users from using such
passwords
4. This will prevent dic onary a acks
5. Drawbacks: strong minded opponent can steal
password file and spend full CPU me and spend hours
and days to find password
2. Password genera on
1. Many OS can produce computer generated password
2. These passwords are random in nature
3. Can be pronounceable
4. Users are not allowed to select their own passwords
5. Drawback: difficulty in remembering in system
generated passwords
3. Password aging
1. Password can be set with expiry date
2. System forces users to change their password at regular
intervals
3. Addi onal mechanism is provided to prevent users
from used previous passwords
4. By lis ng previous 10 passwords used by users
4. Limit login a empts
1. Monitoring mechanism is used to check unsuccessful
login a empts
2. If found- lock the users completely or at least certain
period of me
3. This will prevent and discourage further a empts
 Many mes, users avoid remembering complicated passwords and write it on piece
of paper and keep it near computer
 This will help poten al intruder
 Security manager should search such password notes posted on computer terminals
and no fy to the users
 Because of Frequently changing password user are tempted to choose passwords
which are easy to remember
 If password is forgo en then user should follow all password precau ons while
selec ng new password
 Changing password is a good advice but don’t change passwords before weekends or
holidays

Password a acks

1. Piggybacking
 Following closely behind a person who has just
used their access card or PIN to gain physical
access to a room or building
 In this manner a acker can gain access to the
facility without knowing the access code or
without access card

2. Shoulder Surfing
 A ackers posi on themselves in such a way that
he is able to observe the authorised user
entering the correct access code
 This a ack used observa on techniques
 Both a acks are easily possible by simple
techniques of following and observing someone
closely
3. Dumpster diving
 a type of passive a ack where a hacker or
a acker searches through trash for sensi ve
informa on
 not only trash but access codes or passwords
wri en on s cky notes
 innocent informa on like- phone list calendar or
organiza onal order can be used to assist
a acker to gain access to network
 to prevent this a ack:- company should
establish a disposal policy
  where all papers, including printouts
are shredded in crosscut shredder
before being recycled
  all storage media is erased
  all staff is educated about the danger
of untracked trash
 Defini on: A ackers need certain amount of
informa on before a ack. If a acker is in
surrounding area of the target, one common
place to find informa on is to go through
target’s trash to find useful informa on. This
process of going through target’s trash is known
as Dumpster Diving
 If a ackers are lucky and targets security is
poor, they may find user ID and passwords
 When password is changes users discard the
paper where password was wri en without
shredding it and dumpster luckily gets the clue
 Even though a acker doesn’t get password
directly they can find the name of the employee
and guess ID of the user
Biometrics

 Access controls such as fingerprints can iden fy authorised users


 The something you are method is known as biometrics
 Individuals cannot be recognized with external measurements
 One method can be applied by using – handwri ng analysis, re na scan, iris scans,
voiceprints, hand geometry and facial geometry etc.
 Biometrics can be used to control access to computer systems and networks and also
to serve as a physical access control device
 Biometric takes advantage of uniqueness of human characteris cs
 This method is more reliable and repeatable
 Biometrics is combina on of human physiology, pure mathema cs and
engineering
 Hand geometry requires large device  which can be easily placed outside the door
for access control of specific room  but this will not be convenient to control access
to a computer system  because reader needs to be placed in front of each
computer or with a group of systems

Types of Biometrics

1. Fingerprint
 Fingerprint is the pa ern of ridges and furrows on the surface of the finger p and it
is unique across the en re human popula on
 Fingerprint involves a finger size iden fica on sensor with very low-cost biometric
chip
 Automated fingerprint recogni on and matching system extract a number of features
from fingerprint for storage as a numerical subs tute for the full fingerprint pa ern
 This system is specifically a ached to specific computer or network assets
 Limita ons:
o A person’s physical changes cannot be considered
o Cost of computer hardware and so ware can be expensive
o Fingerprint scanner can some mes lead to false rejec on or false acceptance
o Fingerprint can vary with dryness of skin or age
2. Hand Prints
 Hand prints are most appropriate for fixed physical loca on requiring very high
assurance to iden fy
 It combines hand biometric with 5 different fingerprint biometrics
 Iden fies features of hands like – shape, length, width of fingers
 Handprints are used for tradi onal applica ons like- data rooms, sensi ve office
zones/buildings, na onal security/intelligence facili es and vaults
3. Re na
 Re na Scan involves  examina on of the unique pa erns on the back of a person’s
eye
 Re na pa ern is formed by veins beneath the re nal surface
 It is unique and suitable for iden fica on
 Re na biometric system obtains a digital image of re nal pa ern by projec ng a low
intensity beam of visual or infrared light into the eye
4. Voice/Speech pa ern
 This type of verifica on is done without any specialized recording device
 Voiceprint recogni on is completely a part of algorithms and analysis so ware
 This mechanism is able to use phone-based applica on e.g. Voice response system
and me and card entry
 Use of voice verifica on will increase possibility to protect remote data repor ng
applica ons which will be more helpful in criminal jus ce and healthcare industry

5. Signature and Wri ng Pa erns
 Every individual as – unique handwri ng
 Reflected in signature  frequently wri en sequence
 Single user can have – mul ple – non-iden cal signatures
 This makes computer representa on of signature complicated
 Biometric verifica on of signature/handwri ng  is different that simple signature
capture pads
 Simple signature capture pad:
o Records an image of what person wrote
 Biometric enabled capture pad:
o Records the pressure
o Distance of strokes
o Speed of wri ng
 This data verifies originally enrolled person
 Uses: financial and legal communi es

6. Keystrokes
 Art and science of recognizing typing pa erns
 This biometric type arising since past 2 decades
 Cheaper to implement
 Hardware required: only keyboard
 Data collec on
o Through so ware
o Virtually possible
 For each keystroke  press me and release me is considered
 Physical presence of user not required

Authoriza on

 “Process of gran ng or restric ng access to specific resource”


 To the trusted user
 A er verifica on of iden ty  permissions are evaluated

Goals of Authoriza on

 Protect Data: preven ng unauthorised access to sensi ve data


 Implemen ng Security Policies: authoriza on helps in implemen ng security policies
 Restric ng Access: access minimal amount of data as per requirement
 Reducing Risk: of misuse of data by limi ng access according to roles

Access control

Defini ons

Access: ability of a subject to interact with an object

Authen ca on: verifying the iden ty of the subject

Access control: ability to specify, to control and to limit the access of the host system
or applica on in terms of accessibility, integrity, confiden ality

Authen ca on: verifica on that the creden als of users or other system are valid
Authen ca on mechanism

 Used to prove iden ty of the user


 To make sure only valid users are admi ed
 3 methods used in authen ca on
1. Something-you-know: user ID and Password
2. Something-you-have: lock and key or OTP
3. Something-about-you: finger prints , DNA etc

Principle, access rights and permissions

 Purpose of access control is to limit the ac ons or opera ons that authorised user
can perform

1. Principle of least privilege: if not officially assigned user should not be able to access
that resource no default access to all

2. Separa on of du es: if du es are specially assigned then one should be able to


access that resource only

3. Need to know: access to that resource should be given according to specific


requirements to perform their du es

Policies: are high level guidelines which determines how accesses are controlled and
access decisions determined

Mechanism: are low level so ware and hardware func ons which can be configured to
implement the policy.

1. Access control Matrix (ACM) – provides the simplest framework for showing the
process.

 Ac vity in the system – ini ated by en es known as subjects accessing objects


 Subjects – users or programs
 Objects- computer, database, file programs
 Subjects ini ate ac ons on the object
 These ac ons are permi ed or denied based on authoriza on
 E.g files- read, write, execute, own
 Row denotes – subject
 Column denotes – objects.
 Access control matrix separates problem of authen ca on from authoriza on
 E.g.

 In a large system the matrix will be huge i.e. big company big matrix.

2. Access Control List (ACL) – it contains subject that have access rights to par cular
object.

 It is a list that contains subjects having access rights to a par cular object
 Accesses provided- read, write, execute same as ACM
 List will iden fy not only subject but also specific access to the object
 Easy to revoke exis ng accesses by replacing empty ACL
 It is important to examine ACL while reviewing system
 ACL- small in size- stored in few bits
 Used in computer system or network system

Audit: An independent review and examina on of system records and ac vi es

 in order

to test the adequacy of system control.

ensure compliance with established policies & opera onal procedures

 to detect breaches in security

 to recommend any indicated changes in control, policy and procedures.


Policies –DAC, MAC, RBAC

1. DAC – Discre onary Access Control

 “a means of restric ng access to object based on the iden ty of subject or groups


which they belong”
 Controls access- based on iden ty of the requestor and on access rules
 Object or group is checked against the specified authoriza on
 In discre onary approach – owner can decide  which other subjects may have
access to the object and which specific access they may have
 E.g. permission bits used in UNIX
Permissions- read/write/execute
Owner of the file can specify these permissions
 Access Control List (ACL) – another mechanism used to implement DAC
 DAC – suitable for variety of systems and applica ons
 Commercial and industrial environments
 Drawback- it does not provide real assurance on the flow of informa on in a system
 - easy to bypass
 - authorised user can pass data to unauthorised user

2. MAC – Mandatory Access Control

 Decides access on the basis of classifica on of subjects and objects


 Each user is assigned a security level
 Used in environments where different levels of security is requires
 Defini on : “ a means of restric ng access to objects based on the sensi vity of the
informa on contained in the objects and the formal authoriza on of the subject to
access informa on of such sensi vity”
 This is the job of OS not owner/subject to decide access gran ng
 Individual subject cannot make changes to the access
 E.g. military – security classifica on  secret, top secret
 Individuals with top secret clearance can view top secret file
 MAC is applied to the protec on of informa on integrity

3. RBAC – Role Based Access Control

 Access is based upon the ac vi es users execute in the system


 “ a means of restric ng access to objects based on the Role of the subject”
 Users are assigned – set of roles
 Roles are assigned- access permissions
 Permissions are granted based on specific du es which they must perform

4. ABC – A ribute based access control


 New control policy
 Based on a ributes associated with iden ty
 A ributes- user details, resource informa on, environmental factors(loca on or
me), user creden als
 “an access control method where subject requests to perform opera ons on the
objects which are granted or denied based on assigned a ributes of the subjects,
assigned a ributes of the objects , environmental condi ons, and set of policies that
are specified in terms of those a ributes or condi ons”
 ABAC – implemented using standards like eXtensible Access Control Markup
Language(XACML)
 Uses a ributes and policies to decide access rights
 E.g.

You might also like