Chapter-1 Access Control Systems & Methodology
Chapter-1 Access Control Systems & Methodology
Chapter-1 Access Control Systems & Methodology
IDS :
Three ways to detect an intrusion: o o o Signature Recognition- it is also known as misuse detection. Signature recognition tries to identify events that misuse a system. Anomaly detection:- it detects the intrusion based on the fixed behaviroal characterstics of the users and components in a computer system. Protocol Anomoly Detection: - in this type of detection, models are built on TCP/IP protocols using their specfications.
Tripwire is a system integrity verifiers that monitors system files and detects changes by an intruder.
Page 1 of 30
Page 2 of 30
Page 3 of 30
Page 4 of 30
Page 5 of 30
Honey pots , Padded Cells systems and Vulnerability analysis complement IDS to enhance an organizations ability to detect intrusion. Honey pot Systems : Event Triggers, Sensitive monitors, Event loggers. IDS serve as monitoring mechanisms, watching activities, and making decisions about the whether the observed events are suspicious. Firewall serve as Barrier Mechanisms. IDS look at security policy violations dynamically. IDS are analogous to security monitoring cameras. Vulnerability analysis systems take a static view of symptoms. IDS detected and reported : System scanning attacks, DOS attack, system Penetration attacks. Honey pots and Padded Cells systems have Legal Implications. Classification of IDS: Network-based IDS, Host-based IDS, Application- based IDS. Signature-based IDS- is the primary technique used by commercial systems to analyse events to detect attacks. Page 6 of 30
Page 8 of 30
Page 9 of 30
Page 10 of 30
Page 11 of 30
Rule-based access control: Rule-based and MAC are the same since they are based on specific rules relating to the nature of the subject and object. It is based on access rules. Discretionary Access Controls:
Page 12 of 30
An access control matrix is placing the name of Users in each row and the names of ojbects in each column. Example of objects are : records, programs, pages, files, directories etc. An access control matrix describes an association of objects and subjects for authentication of access rights. Identity-based policy and User-directed policy are eg. DAC. ACLs: ACLs techniques provide a straightforward way of granting and denying access to for a specified user. An ACL is an object associated with a file and containing entries specifying the access that individual users or groups of users have to the file.Access control list is most commonly used in the implementation of an access control matrix. Mandatory Access Controls :
A MAC restrict access to objects based on the sensitivity of the information contained in the objects and the formal authorization(i.e.clearence) of ojbects to access information of such sensitivity.it uses security labels. Simplest to amdiminster. A security label or access control mechanism is supported by MAC.Security Labels are very strong form of access control. e.g. Rule-based policy e.g. MAC. Access Control Mechanisms: Logical ( passwords and encryption)
Page 13 of 30
Non-DAC: Lattice security model is based on non-DAC. Access to computer facilities and records is limited to authorized personnel on an as needed basis.
Consistent with the Principle of Least Privilege: Re-authorization when employees change positions Users have little access to systems. Users have significant access to systems.
Authorization creep: occurs when employees continue to maintain access rights for previously held positions within an organization and it is a security vulnerability.
I&A techniques:
Page 14 of 30
Password Management Preventive control. A virtual password is a password computed from a passphrase that meets the requirements of the password storage(e.g.56 bits for DES). User IDs and Passwords are first line of defence against potential security threats ,risks or losses to the network. Use of login IDs and passwords is the most commonly used mechanism for providing static verification of a user. Using password advisors is the most effective method for password creation. A more simple and basic login controls include : validating username and password. Password secrecy cannot be tested with automated vulnerability testing tools. Use randomly generated characters password selection procedure would be the most difficult to remember. Password can be stored in password file preferably encrypted. Password sharing , password guessing and password capturing are the most commonly used methods to gain unauthorized access..
Page 15 of 30
Page 16 of 30
Kerberos identification and authentication technique involves a ticket that is linked to a users password to authenticate a system user. The Key-distribution-server is a major vulnerability with Kerberos.56bit size. Pre-authentication is required to thwart attacks against a Kerberos security server. Kerberos uses a trusted third party, Kerberos is a credential-based authentication system, Kerberos uses symmetric-key cryptography. Kerberos is a(n): Ticket-oriented protection system. A replay attack refers to the recording and retransmission of message packets in the network.it can be prevented by using packet time-stamping. Kerberos can prevent playback(replay)attack. Most to least protection against replay attacks: Challenge response, one-time password, password and PIN, and Password only.
Kerberos used : Managing encryption keys, Managing centralized access rights, Managing access permissions.
Page 17 of 30
Strength of Kerberos: Works with an existing security systems software Intercepting and analysing network traffic is difficult. The major advantage of a SSO- goes beyond convenience.
Secure RPC and SPX provides a robust authentication mechanism over distributed environments. SecureID: Is a token from RSA , inc. Authentication mechanisms: what the user knows, what the user has, what the user is.
Page 18 of 30
A more reliable authentication device is a : Smart card system. An example of drawback of smart card includes A means of gaining unauthorized access. Smart card: as a means of access control, as a medium for storing and carrying the appropriate data , a means of access control and data storage. Robust Authentication: is provided by Keberos , One-Time Passwords,Challengeresponse exchanges, Secure RPC and Digital Certificates. Address-based access mechanisms : creates a security problem. It use IP source addresses, wich are not secure and subject to IP address spoofing attacks. The IP address deals wih Identification. Location-based: where the user is authentication techniques is impossible to forge.it deals with physical address.its used for continuous authentication. Token-based: token as a means of identification and authentication. Web-based access mechanisms:uses a secure protocols to accomplish authentication. Password and PINs are vulnerable to guessing , interception, or brute force attack.
Page 19 of 30
Chapter-1 Access control Systems & Methodology Biometrics can be vulnerable to interception and replay attacks.
Biometric system:
user identification and authentication techniques depend on reference profiles or templates. Impersonation attacks involving the use of physical keys and biometric checks are less likely due to the need for the network attacker to be physically near the biometric equipment. Protective Measures is effective against multiple threats: Access Logs,Encryption,Audit Trails. Security mechanisms is least efficient and least effective: Recurring password.(weak security mechanisms). Cryptography authentication techniques require additional work in administering the security. Access Controls: Physical access controls: Operating system access controls: Communication system access controls: Application system access control most specific.
Page 20 of 30
Controlling access to the network is provided by Identification and authentication pair of high-level system services. Authentication is a protection against fraudulent transactions: The validity of message location being sent. The validity of workstations that sent the message. The validity of the message originator.
Identification techniques provide strong user authentication: What the user is (PIN+combined with fingerprint) for high dollar transactions. What the user has(bank automated teller machine card) What the user knows
providing data integrity for common commercial activities. Separation of duties concept. An access triple subject, program and data. Biba Security Model:
Page 21 of 30
Integrity model in which no subject may depend on a less trusted object, including another subject. Take-Grant Security: Access rights Chinese Wall: Access control problem. Bell-Lapadula model:
security clearance and sensitivity classification. It deals with *-Property (No-write down is allowed).it addresses confidentiality by describing different security levels of security classifications
Page 22 of 30
Page 23 of 30
Page 24 of 30
Page 25 of 30
Penetration Tests:
The correct sequence: Inform the management about the test Develop a test plan
Page 27 of 30
Fraud:
Separation of duties, job rotation, and mandatory vacations are management controls that can help in preventing fraud. Separation of duties: The greatest control exposure in a microcomputer(PC) environment is a Lack of separation of duties. The objective of separation of duties is that: NO one person has complete control over a transaction or an activity.
Page 28 of 30
Page 29 of 30
Page 30 of 30