Computer and Network Security 1
Computer and Network Security 1
Countermeasures: Means used to deal with security attacks. Prevent, Detect, Recover. Residual vulnerabilities may
remain. May itself introduce new vulnerabilities. Goal is to minimize residual level of risk to the assets.
Symmetric Encryption
• The universal technique for providing confidentiality for transmitted or stored data
• Also referred to as conventional encryption or single-key encryption
• Two requirements for secure use:
• Need a strong encryption algorithm
• Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key
secure
Message Authentication
- Protects against active attacks.
- Verifies received message is authentic.
• Contents have not been altered
• From authentic source
• Timely and in correct sequence
- Can use conventional encryption.
• Only sender and receiver share a key
Public-Key Encryption Structure: Publicly proposed by Diffie and Hellman in 1976, based on mathematical functions,
asymmetric.
• Uses two separate keys
• Public key and private key
• Public key is made public for others to use
- Some form of protocol is needed for distribution.
Digital Signatures
- NIST FIPS PUB 186-4 defines a digital signature as: ” The result of a cryptographic transformation of data that,
when properly implemented, provides a mechanism for verifying origin authentication, data integrity and
signatory non-repudiation.”
- Thus, a digital signature is a data-dependent bit pattern, generated by an agent as a function of a file, message,
or other form of data block.
- FIPS 186-4 specifies the use of one of three digital signature algorithms:
o Digital Signature Algorithm (DSA)
o RSA Digital Signature Algorithm
o Elliptic Curve Digital Signature Algorithm (ECDSA)
Random Numbers
- Uses include generation of:
o Keys for public-key algorithms
o Stream key for symmetric stream
cipher
o Symmetric key for use as a
temporary session key or in creating
a digital envelope.
o Hand shaking to prevent replay
attacks.
o Session key
Random Number Requirements
- Randomness
o Criteria:
▪ Uniform distribution
• Frequency of occurrence of each of the numbers should be approximately the
same.
▪ Independence
• No one value in the sequence can be inferred from the others.
- Unpredictability
o Each number is statistically independent of other numbers in the sequence.
o Opponent should not be able to predict future elements of the sequence on the basis of earlier
elements.
NIST SP 800-63-3 (Digital Authentication Guideline, October 2016) defines digital user authentication as: “The process of
establishing confidence in user identities that are presented electronically to an information system.”
The four means of authenticating user identity are based on:
- Something the individual knows.
o Password, PIN, answers to prearranged questions
- Something the individual possesses.
o Smartcard, electronic keycard, physical key
- Something the individual is (static biometrics)
o Fingerprint, retina, face
- Something the individual does (dynamic biometrics)
o Voice pattern, handwriting, typing rhythm.
Assurance Level
- Describes an organization’s degree of certainty that a user has presented a credential that refers to his or her
identity.
- More specifically is defined as:
o The degree of confidence in the vetting process used to establish the identity of the individual to whom
the credential was issued.
o The degree of confidence that the individual who uses the credential is the individual to whom the
credential was issued.
- Four levels of assurance
o Level 1: Little or no confidence in the asserted identity's validity
o Level 2: Some confidence in the asserted identity’s validity
o Level 3: High confidence in the asserted identity's validity
o Level 4: Very high confidence in the asserted identity’s validity
Potential Impact
• FIPS 199 defines three levels of potential impact on organizations or individuals should there be a breach of security:
o Low: An authentication error could be expected to have a limited adverse effect on organizational operations,
organizational assets, or individuals
o Moderate: An authentication error could be expected to have a serious adverse effect
o High: An authentication error could be expected to have a severe or catastrophic adverse effect
Password-Based Authentication
• Widely used line of defense against intruders
o User provides name/login and password
o System compares password with the one stored for that specified login
• The user ID:
o Determines that the user is authorized to access the system
o Determines the user’s privileges
o Is used in discretionary access control
Password Vulnerabilities
Offline dictionary attack Workstation hijacking
Specific account attack Exploiting user mistakes
Password guessing against single user. Electronic monitoring
Popular password attack Exploiting multiple password use
UNIX Implementation
Original scheme
• Up to eight printable characters in length
• 12-bit salt used to modify DES encryption into a one-way hash function
• Zero value repeatedly encrypted 25 times
• Output translated to 11-character sequence
Now regarded as inadequate
• Still often required for compatibility with existing account management software or multivendor
environment
Improved Implementations
Much stronger hash/salt schemes available for Unix
Recommended hash function is based on MD5.
•Salt of up to 48-bits
•Password length is unlimited
•Produces 128-bit hash
•Uses an inner loop with 1000 iterations to achieve slowdown
OpenBSD uses Blowfish block cipher-based hash algorithm called Bcrypt.
•Most secure version of Unix hash/salt scheme
•Uses 128-bit salt to create 192-bit hash value
Password Cracking
Dictionary attacks
• Develop a large dictionary of possible passwords and try each against the password file
• Each password must be hashed using each salt value and then compared to stored hash values
Rainbow table attacks
• Pre-compute tables of hash values for all salts
• A mammoth table of hash values
• Can be countered by using a sufficiently large salt value and a sufficiently large hash length
Password crackers exploit the fact that people choose easily guessable passwords.
• Shorter password lengths are also easier to crack
John the Ripper
• Open-source password cracker first developed in in 1996
• Uses a combination of brute-force and dictionary techniques
Modern Approaches
• Complex password policy: Forcing users to pick stronger passwords
• However, password-cracking techniques have also improved
o the processing capacity available for password cracking has increased dramatically
o the use of sophisticated algorithms to generate potential passwords
o Studying examples and structures of actual passwords in use
Password Selection Strategies
User education: Users can be told the importance of using hard to guess passwords and can be provided with
guidelines for selecting strong passwords.
Computer generated passwords: Users have trouble remembering them.
Reactive password checking: System periodically runs its own password cracker to find guessable passwords.
Complex password policy: User is allowed to select their own password; however, the system checks to see if
the password is allowable, and if not, rejects it. Goal is to eliminate guessable passwords while allowing the user
to select a password that is memorable.
Memory Cards
• Can store but do not process data
• The most common is the magnetic stripe card
• Can include an internal electronic memory
• Can be used alone for physical access
o Hotel room
o ATM
• Provides significantly greater security when combined with a password or PIN
• Draw backs of memory cards include:
o Requires a special reader
o Loss of token
o User dissatisfaction
Smart Tokens
• Physical characteristics:
o Include an embedded microprocessor
o A smart token that looks like a bank card
o Can look like calculators, keys, small portable objects
• User interface:
o Manual interfaces include a keypad and display for human/token interaction
• Electronic interface
o A smart card or other token requires an electronic interface to communicate with a compatible
reader/writer
o Contact and contactless interfaces
• Authentication protocol:
o Classified into three categories:
• Static
• Dynamic password generator
• Challenge-response
Smart Cards
• Most important category of smart token
o Has the appearance of a credit card
o Has an electronic interface
o May use any of the smart token protocols
• Contain:
o An entire microprocessor
• Processor • Memory • I/Oports
• Typically include three types of memory:
o Read-only memory (ROM)
• Stores data that does not change during the card’s life
o Electrically erasable programmable ROM (EEPROM)
• Holds application data and programs
o Random access memory (RAM)
• Holds temporary data generated when applications are executed
Protection Domains
• Set of objects together with access rights to those objects
• More flexibility when associating capabilities with protection domains
• In terms of the access matrix, a row defines a protection domain
• User can spawn processes with a subset of the Access rights of the user
• Association between a process and a domain can be static or dynamic
• In user mode certain areas of memory are protected from use and certain instructions may not be executed
• In kernel mode privileged instructions may be executed and protected areas of memory may be accessed
UNIX
File Access Control
Unique user identification number (user ID)
Member of a primary group identified by a group ID.
Belongs to a specific group.
12 protection bits
Specify read, write, and execute permission for the
owner of the file, members of the group and all other
users.
The owner ID, group ID, and protection bits are part of
the file’s inode.
ABAC Policies
A policy is a set of rules and relationships that govern allowable behavior within an organization, based on the privileges of
subjects and how resources or objects are to be protected under which environment conditions
Typically written from the perspective of the object that needs protecting and the privileges available to subjects
Privileges represent the authorized behavior of a subject and are defined by an authority and embodied in a policy
Other terms commonly used instead of privileges are: rights, authorizations, and entitlements
Identity Management
Concerned with assigning attributes to a digital identity and connecting that digital identity to an individual or NPE
Goal is to establish a trustworthy digital identity that is independent of a specific application or context
Most common approach to access control for applications and programs is to create a digital representation of an
identity for the specific use of the application or program
Maintenance and protection of the identity itself is treated as secondary to the mission associated with the application
Final element is lifecycle management which includes:
•Mechanisms, policies, and procedures for protecting personal identity information
•Controlling access to identity data
•Techniques for sharing authoritative identity data with applications that need it
•Revocation of an enterprise identity
Credential Management
The management of thelife cycle of the credential
Examples of credentials are smart cards, private/public cryptographic keys, and digital certificates
Encompasses five logical components:
An authorized individual sponsors an individual or entity for a credential to establish the need for the credential The
sponsored individual enrolls for the credential
• Process typically consists of identity proofing and the capture of biographic and biometric data
• This step may also involve incorporating authoritative attribute data, maintained by the identity management
component
A credential is produced
• Depending on the credential type, production may involve encryption, the use of a digital signature, the production of a
smart card or other functions The credential is issued to the individual or NPE
A credential must be maintained over its life cycle
• Might include revocation, reissuance/replacement, reenrollment, expiration, personal identification number (PIN) reset,
suspension, or reinstatement
Access Management
Deals with the management and control of the ways entities are granted access to resources
Covers both logical and physical access
May be internal to a system or an external element
Purpose is to ensure that the proper identity verification is made when an individual
attempts to access a security sensitive building, computer systems, or data
Three support elements are needed for an enterprisewide access control facility:
• Resource management
• Privilege management
• Policy management
Three support elements are needed for an enterprise-wide access control facility:
Resource Management:
• Concerned with defining rules for a resource that requires access control
• Rules would include credential requirements and what user attributes, resource attributes, and environmental
conditions are required for access of a given resource for a given function
Privilege management
• Concerned with establishing and maintaining the entitlement or privilege attributes that comprise an
individual’s access profile
• These attributes represent features of an individual that can be used as the basis for determining access
decisions to both physical and logical resources
• Privileges are considered attributes that can be linked to a digital identity
Policy management:
• Governs what is allowable and unallowable in an access transaction
Identity Federation
• Term used to describe the technology, standards, policies, and processes that allow an organization to trust digital
identities, identity attributes, and credentials created and issued by another organization
• Addresses two questions:
o How do you trust identities of individuals from external organizations who need access to your systems
o How do you vouch for identities of individuals in your organization when they need to collaborate with external
organizations