TECH2400 Week 07 Workshop
TECH2400 Week 07 Workshop
Cyber Security
Workshop 7
Access Control & Authentication
COMMONWEALTH OF AUSTRALIA
Copyright Regulations 1969
WARNING
The material in this communication may be subject to copyright under the Act.
Any further reproduction or communication of this material by you may be the
subject of copyright protection under the Act.
Importance:
- Protects sensitive data and systems from unauthorised
access
- Enforces organisational security policies
- Helps meet compliance requirements (e.g., ISO27001,
GDPR, etc.)
- Reduces the risk of insider threats and external attacks
Access Control Principles
Least Privilege
Authentication
- The process of verifying the identity of a user or system
- Are you allowed to enter?
Authorisation
- The process of determining what an authenticated user
or system is allowed to do (e.g., access, modify, delete)
- What are you allowed to do once you're inside?
Authentication Mechanisms
Authentication mechanisms verify a user's identity before
granting access to a system or resource.
1) Passwords
o A secret combination of characters that a user
must enter to prove their identity
o Example: Logging into an email account using a
username and password
o Benefits: Simple, widely used, easy to implement
o Disadvantages: Can be weak, easily guessed,
and vulnerable to attacks (e.g., phishing, brute
force)
Authentication Mechanisms
2) Tokens
o A physical or digital item that generates or stores
authentication data
o Example: A one-time password (OTP) sent via
SMS or generated by an authenticator app
o Benefits: More secure than passwords alone,
prevents access if a password is stolen, time-
limited for added security
o Disadvantages: Physical tokens can get lost,
SMS-based tokens can be intercepted, requires an
additional device or software
Authentication Mechanisms
3) Biometrics
o Authentication based on unique biological traits,
such as fingerprints, facial recognition, or iris scans
o Example: Unlocking a smartphone using a
fingerprint
o Benefits: Unique to individuals, eliminates the
need for passwords, fast and convenient
o Disadvantages: Can be spoofed, biometric data
cannot be changed if compromised, privacy
concerns regarding storage and misuse
Multi-Factor Authentication (MFA)
A security mechanism that requires users to verify their
identity using two or more authentication factors from
different categories.
Benefits:
- Enhances security
- Reduces reliance on passwords
- Mitigates phishing and credential theft attacks
- Improves compliance with security regulations
Multi-Factor Authentication (MFA)
Combine at least two of these factors for MFA
implementation
Factor Examples
Something you KNOW Passwords, PINs
Question:
What could happen if your password was stolen? How
does MFA help?
MFA Examples
You need to access sensitive company data remotely.
Question:
Why would a smart card alone be not enough for
security?
MFA Examples
You want to approve a payment on your phone using a
banking application.
Steps Factor Method
1 Something you ARE You unlock your phone using
facial recognition
2 Something you DO The application detects your
usual typing speed and pattern
before allowing the transaction
Question:
What makes behavioural biometrics different from
traditional authentication?
MFA Examples
You work in a government agency handling classified
data. To enter your office, you must go through multiple
authentication steps.
Steps Factor Method
1 Something you KNOW You enter a PIN code at the entrance
Question:
Why do organisations implement a third authentication
factor despite the added time and resource costs?
MFA Examples
You are a software developer who needs to log into your
company's system from home securely.
Question:
What are some drawbacks of using typing biometrics as
an authentication factor?
MFA Implementation
MFA can be integrated into applications via authentication
tools that provide multiple verification steps.
9) Click Continue
Activity: MFA Implementation
Step 5: Test the Login Flow
If the test is successful, you will see a confirmation page
Access Enforcement
Once authenticated, access control systems enforce authorisation
decisions to ensure users can only access permitted resources.
- Professional ethics
- Cyber security laws and regulations
- Data privacy and protection regulations
- Compliance and reporting
- Ethical hacking, and its legal and ethical
boundaries