Topics and Sub-Topics: Unit - 2: User Authentication and Access Control
Topics and Sub-Topics: Unit - 2: User Authentication and Access Control
• Passwords can include letters, numbers, and special characters, and most
1. Dictionary Attack:
• There are a number of most commonly found passwords online in the form of
dictionaries.
• This dictionary consists of a list of passwords leaked in a data breach or commonly used
passwords.
• Example: abc123, 123456789, password, abcdef, etc.
2.1.2 Guessing Password: Continue…..
• Prevention:
• Include a combination of upper case letters, lower case, and special symbols into the
password to make it more secure.
• Make sure the password manager you are using is secure and is not engaged in the
selling of data.
• Avoid creating weaker passwords (like password, abc123, etc.), instead create a strong
password (like !ush3r, sn00pdoggyd0G, etc.)
• Create a password with at least 8 characters long, which makes it difficult to carry out
brute-force attacks.
• Prevention:
• Avoid creating weaker passwords (like password, abc123, etc.), instead create a
strong password (like !ush3r, sn00pdoggyd0G, etc.)
• Create a password with at least 8 characters long, which makes it difficult to carry
out brute-force attacks.
• Regularly change your password in case it is compromised.
• Never include personal information in passwords like name, date of birth, mobile
number, etc. which makes it easier for attackers to guess correctly.
2.1.2 Guessing Password: Continue…..
3. Key logger Attack:
• Key loggers are malicious software made with the purpose to record all the
keystrokes of the user and report them back to the hacker.
• Mostly, the user installs software from unofficial sources believing it to be
legitimate, but that software installs key loggers without the user knowing it. This
results in all the keystrokes being recorded and reported to the hacker; in many
cases, the hacker is able to guess the password easily.
• Prevention:
• Regularly update your software for security patches.
• Buy antivirus software from a reputed company and have a system scan from
time to time.
• Make sure you don’t plug in unknown media devices like pen drives.
2.1.2 Guessing Password: Continue…..
4. Man-in-the-middle attack:
• Basically, in these types of attacks, the hacker intercepts (or get access to the
compromised system) the original connection between the user and Web
App/Server and acts as a middleman between the client and the server.
• In this way, the hacker has access to the information passing between the client
and server, including passwords.
2.1.2 Guessing Password: Continue…..
• Prevention:
• Ensure you have a strong password and two-factor authentication turned on.
• Make sure your router is encrypted.
• Avoid using public Wi-Fi and use a VPN for proper encryption of traffic.
• Make sure the web application you are using is secure and follows HTTPS
protocol.
• Its objective is to gain free network access which is often exploited to attempt
malicious activities like data breaching and dissemination(spreading) of malware.
• It can also lead to slower internet speed for all the systems connected to the
network.
• Even if piggybacking isn’t attempted with malicious intent, it’s still illegal because
the user is taking undue advantage of a service they haven’t paid for.
How Does Piggybacking Work?
• Piggybacking attacks were easier and more common in the past because Wi-Fi
networks were unencrypted.
• Anyone within the signal’s range could access a network without entering a
security password. So, hackers just had to be in the range of a wi-fi hotspot’s
signal and select the chosen network from the options presented.
• However, in today’s date, most Wi-Fi networks are encrypted and secured with
passwords, making these attacks more challenging and less common.
• It’s still possible for threat actors to access a network if they have the password or
can crack the encryption.
6. Use a Password:
• Set a strong password that has to be used to access the wi-fi connection of your
workplace. Also, change the default password that comes with your router and use
something that isn’t too obvious to crack. You can use password-managing tools for this.
2. Add a privacy screen to your devices: Using devices with attached privacy
screens dramatically lessens the risk of data disclosure. Some glass protector
manufacturers have versions with a privacy screen included, which not only
protects your phone’s glass but the information on your phone, too.
3. Always be aware of your surroundings: In public places, don’t let your guard
down. Attackers gravitate to those that they see as the easiest. If you’re
distracted, you may not notice someone is watching you and what you’re
entering into the device or the ATM.
• Prevention:
1. Destroy any CDs/DVDs containing personal data.
2. In case you no longer need your PC, make sure you have deleted all the data so that it
can’t be recovered.
3. Use of firewalls can prevent suspicious Internet users from accessing the discarded data.
4. Paper documents should be permanently destroyed/shredded.
5. Companies should lock waste bins and should have a safe disposal policy.
2.2 Biometrics:
2.2.1 What is Biometrics ?
• Biometrics is measure of biological or behavioral features which are used for
identification of individuals. Most of these features are inherit and cannot be
guessed or stolen.
2.2 Biometrics: Continue…….
• The biometric feature being used must be available in the database for all
individuals in the community before the feature can be used for authentication.
This is called enrollment.
• Authentication can be in one of the following forms :
1. Identification:
Matching an individuals features against all records to check whether his/her record is
present in the database.
2. Verification:
To check whether the person is who he/she is claiming to be. In this case the features
of the person is matched only with the features of the person they claims to be.
2.2.3 Types of Biometrics:
:
There are two broad categories of biometrics:
1. Physiological Biometrics
2. Behavioral Biometrics
1. Physiological Biometrics:
• Physical traits(characteristics) are measured for identification and verification in
this type of biometrics.
• The trait should be chosen such that it is unique among the population, and
resistant to changes due to illness, aging, injury, etc.
2. Behavioral Biometrics:
• Traits of human behavior are measured in this case. Monitoring is required in this
type of biometrics to prevent impersonation by the claimant.
• For example typing rhythm, gait(walk), signature and voice.
2.2.3.1 Physiological Biometric Techniques:
: Fingerprint:
1.
• Fingerprints are unique for every individual. They can be measured in several
ways.
• It has high level of security and used both for identification and verification.
2.2.3.1 Physiological Biometric Techniques:
2. Facial Recognition:
:
• Features of the face like distance between nose, mouth, ears, length of face, skin
color, are used for verification and identification.
• Accuracy can be affected by fog, sunglasses, aging, etc.
4. Voice Recognition:
• The pitch, voice modulation, and tone, among other things are measured.
• The accuracy can be hindered due to the presence of noise, or due to aging or
illness.
5. DNA:
• DNA is unique and persistent throughout lifetime.
• Thus security is high and can be used for both identification and verification.
2.2.3.2 Behavioral Biometric Techniques:
•: Behavioral Biometrics:
• Traits of human behavior are measured in this case. Monitoring is required in this
type of biometrics to prevent impersonation by the claimant.
For example finger print, face recognition, DNA, palm print, iris recognition.
• Behavioral are related to the behavior of a person.
2.2.4 Biometric Security Mechanism: Continue….
Step 1): The first block (sensor) is the interface between the real world and the
:
system; it has to acquire all the necessary data.
Step 3) The third block extracts necessary features. This step is an important step as
the correct features need to be extracted in the optimal way.
2.2.5 Advantages of Biometric Security:
• Benefits of using Biometric system over traditional authentication systems:
: Invariant: Biometric traits are invariant over time as smart cards get damaged
1.
over time but biometric traits doesn’t.
4. Convenient: User doesn’t have to remember passwords, pins and keep safe the
smart cards like before.
2.3 Access Control:
• Access control is an essential element of security that determines who is allowed
: to access certain data, apps, and resources—and in what circumstances.
• In the same way that keys and pre-approved guest lists protect physical spaces,
access control policies protect digital spaces.
• It is a fundamental concept in security that minimizes risk to the business or
organization.
1. Physical access control limits access to campuses, buildings, rooms and physical IT
assets.
2. Logical access control limits connections to computer networks, system files and
data.
2.3 Access Control: Continue…..
• To secure a facility, organizations use electronic access control systems that rely
: on user credentials, access card readers, auditing and reports to track employee
access to restricted business locations and proprietary areas, such as data
centers.
• Some of these systems incorporate access control panels to restrict entry to
rooms and buildings, as well as alarms and lockdown capabilities, to prevent
unauthorized access or operations.
• Logical access control systems perform identification,
authentication and authorization of users and entities by evaluating required
login credentials that can include passwords, personal identification
numbers, biometric scans, security tokens or other authentication factors.
• Multifactor authentication (MFA), which requires two or more authentication
factors, is often an important part of a layered defense to protect access control
systems.
2.3.1 Why is access control important?
•: The goal of access control is to minimize the security risk of unauthorized access
to physical and logical systems.
• Access control is a fundamental component of security compliance programs that
ensures security technology and access control policies are in place to protect
confidential information, such as customer data.
• Most organizations have infrastructure and procedures that limit access to
networks, computer systems, applications, files and sensitive data, such as
personally identifiable information and intellectual property.
2.3.2 Access control Models:/Policies
: Mandatory access control (MAC):
1.
• This is a security model in which access rights are regulated by a central authority
based on multiple levels of security.
• Often used in government and military environments, classifications are assigned
to system resources and the operating system or security kernel.
• MAC grants or denies access to resource objects based on the information
security clearance of the user or device.
2.3.3 Principles of Access Controls:
• There are three main principles of Access Controls: Identification, Authentication
and Authorization.
1. Identification:
• Identification is the act of identifying a particular user, often through a
username. Authentication is the proof of this user’s identity, which is commonly
managed by entering a password.
• Identification is the first step in most online transactions and requires a user to
“identify” themselves, usually by providing a name, email address, phone number,
or username.
• This is the process of someone saying that they are a certain person.
• In an online environment, however, it can be difficult to verify that a person is
giving a real identity and that they are who they say they are.
• Identities can be verified through providing more information, often a form of
government-issued ID.
2.3.3 Principles of Access Controls: Continue….
2. Authentication:
• The authentication process is a way for a user to prove that they are still the
person they claimed to be during the identification phase. The safest
authentication methods involve multi-factor authentication (MFA), which requires
the use of more than one form of authentication.
• Only after a user has been properly identified and authenticated can they then be
authorized access to systems or privileges.
3. Authorization:
• Authorization is the means of regulating who can access what.
• The authorization aspect assigns rights and privileges to specific resources.
2.3.4 Audit:
• The audit process gathers data about activity in the system and analyzes it to
discover security violations or diagnose their cause.
• Analysis can occur offline after the fact or online in real time. In the latter case,
the process is usually called intrusion detection.
• Audit has two components: the collection and organization of audit data and an
analysis of the data to discover or diagnose security violations .
• Audit data needs protection from modification by an intruder.
• Vast amounts of audit data can be recorded. Audit data tends to be captured at a
low level of abstraction.
• Analysis of audit data is often performed only when violations are suspected.