Nis Chapter 2
Nis Chapter 2
WHAT IS PASSWORD ?
1. THEY ARE SUFFICIENTLY LONG. LONGER PASSWORD INCREASES GUESSING COMBINATIONS AND
MAKES ITS HACKING DIFFICULT.
3. 3. THEY SHOULD NOT BE DICTIONARY WORDS OR EASY, SIMPLE AND GUESSABLE WORDS.
4. 4. THEY SHOULD NOT RELATE TO PERSONAL PROFILE OF THE USER AS PROFILE IS EASILY READ
ACCESSIBLE TO EVERYBODY. 5. THEY SHOULD NOT BE SIMPLE TYPE MATIC SEQUENCES 'ASDF', '1234',
'ABC123' ETC
CHOOSING PASSWORD
Do’s
Minimum 8 character
Seemingly random but easy to remember Eg. “I have two project
partners : John and Jack”.
Digits should be there. Eg. “john2212”.
Use special symbols Eg. “john#2212”.
Use lower and upper case letters Eg. “”JohN#2212”.
Don'ts
Not be a dictionary word.
Not be family member name only.
CHARACTERISTICS OF GOOD PASSWORD
iv. One or more special character (!, @,#,$,&,:,.,;,?) 3. Password should not consist of dictionary words.
User Education
Computer generated
PASSWORD GUESSING IS THE PROCESS OF ATTEMPTING TO GAIN ACCESS TO A SYSTEM THROUGH THE
SYSTEMATIC GUESSING OF PASSWORDS (AND AT TIMES ALSO USERNAMES) IN AN ATTEMPT TO GAIN A LOGIN TO A TARGET
SYSTEM.
THE ATTACKER OR AUDITOR MAY BE SUCCEED ONLY IN THE EVENT THAT STRONG PASSWORDS ARE NOT USED.
MOST METHODS OF PASSWORD CRACKING REQUIRE THE COMPUTER TO PRODUCE MANY CANDIDATE PASSWORDS, EACH OF
WHICH IS CHECKED.
ONE EXAMPLE IS BRUTE-FORCE CRACKING, IN WHICH A COMPUTER TRIES EVERY POSSIBLE KEY OR PASSWORD UNTIL IT SUCCEEDS.
MORE COMMON METHODS OF PASSWORD CRACKING, SUCH AS DICTIONARY ATTACKS, PATTERN CHECKING, WORD LIST
SUBSTITUTION, ETC
PASSWORD ATTACK -
PIGGYBACKING
SHOULDER SURFING
DUMPSTER DIVING
PASSWORD ATTACK….
PIGGYBACKING
IT IS A SIMPLE APPROACH OF FOLLOWING CLOSELY BEHIND A PERSON WHO HAS JUST USED THEIR
IN THIS WAY AN ATTACKER CAN GAIN ACCESS TO THE FACILITY WITHOUT KNOWING THE ACCESS
CODE.
WIRELESS LAN.
THE USUAL PURPOSE OF PIGGYBACKING IS SIMPLY TO GAIN FREE NETWORK ACCESS RATHER THAN
ANY MALICIOUS INTENT, BUT IT CAN SLOW DOWN DATA TRANSFER FOR LEGITIMATE USERS OF THE
NETWORK
PASSWORD ATTACK…. SHOULDER SURFING
• is a procedure where an attacker position themselves in such a way that he is able to observe the
authorized user entering the correct access code.
• This attack is by direct observation techniques, like looking over someone when he is entering a PIN or
Password etc.
SYSTEM ATTACKERS NEED CERTAIN AMOUNT OF INFORMATION BEFORE LAUNCHING THEIR ATTACK. ONE COMMON PLACE
TO FIND THIS INFORMATION, IS TO GO THROUGH THE TARGET‘S THRASH IN ORDER TO FIND LITTLE BITS OF INFORMATION
THAT COULD BE USEFUL. THE PROCESS OF GOING THROUGH TARGET‘S THRASH IS KNOWN AS ―DUMPSTER DIVING
OR
DUMPSTER DIVING IS LOOKING FOR INFORMATION IN SOMEONE ELSE'S TRASH (A DUMPSTER IS A LARGE TRASH
CONTAINER).
THE SEARCH IS CARRIED OUT IN WASTE PAPER, ELECTRONIC WASTE SUCH AS OLD HDD, FLOPPY AND CD MEDIA RECYCLE
AND TRASH BINS.
IN THE WORLD OF INFORMATION TECHNOLOGY, DUMPSTER DIVING IS A TECHNIQUE USED TO RETRIEVE INFORMATION
THAT COULD BE USED TO CARRY OUT AN ATTACK ON A COMPUTER NETWORK
TO PREVENT DUMPSTER DIVERS, EXPERTS RECOMMEND THAT YOUR COMPANY SHOULD ESTABLISH
DISPOSAL POLICY
BIOMETRICS
FINGER PRINTS
HAND PRINTS
RETINA
PATTERNS
VOICE PATTERNS
SIGNATURE
WRITING PATTERNS
KEYSTROKES
BIOMETRICS
Biometric refers study of methods for uniquely recognizing humans, based upon one or more physical or
behavioral characteristics
OR
Biometrics is idea to map measurements of human physical characteristics to human uniqueness
Advantages/Importance of biometrics
i) Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is
consistent and permanent.
ii) It is also secure in that the biometric itself cannot be socially engineered, shared or used by others.
iii) There is no requirement to remember password or pins, thus eliminating an overhead cost.
iv) Coupled with a smart card, biometrics provides strong security for any credentials on the smart card.
v) It provides a high degree of confidence in user identity.
FINGER PRINTS ((PHYSICAL BIOMETRIC)
During registration, first time an individual uses a biometric system is called an enrolment.
During the enrolment, biometric information from an individual is stored.
In the verification process, biometric information is detected and compared with the information stored at the
time of enrolment.
Refers to automated method of verifying a match between two human fingerprints.
• Used to identify an individual and verify its identity.
• Analysis of fingerprints for matching purposes requires comparison of several features of the print pattern
Stages • Fingerprint Scanning • Fingerprint Matching • Identification
PROCESS:
A fingerprint image is read from a capture device.
Features are extracted from the image.
A template is created for comparison
HAND-PRINTS (PHYSICAL BIOMETRIC)
Everybody has unique hand-print.
Hand-print or hand-geometry verification systems examine the unique measurement of
your hand and use that information to determine whatever you should be allowed access.
Hand-geometry of a person registered in database on the basis of following parameters.
o Length of fingers
o thickness of hand
o shape of curves
o depth of skin
With a hand-print verification system , you press your hand on a hand-geometry reader.
aligning all of your fingers, sensor scan the hand on the basis of above said parameters.
The information is digitized and compare again a hand-print template stored for you in the
system.
System allows access if your hand-print sufficiently matches with stored template.
HAND-PRINTS (PHYSICAL BIOMETRIC)
Disadvantages
5. Because of cuts in hands and rough work handled by user it may create error while reading data
RETINA PATTERNS(PHYSICAL)
The human retina is a thin tissue composed of neural cells that is located in the posterior portion of
the eye.
Because of the complex structure of the capillaries that supply the retina with blood, each persons
retina is unique.
Even the identical twins also not share same eye retina
The retina typically remains unchanged from birth until death.
Advantages
Very high accuracy.
Speedy results.
Disadvantages
Some disease such as diabetic and retinal disorder cause to change eye retina after some age.
High equipment cost
As per change in age and physical conditions and accidents there may be problem in accessing
VOICE PATTERS (BEHAVIORAL )
Everybody has a unique vocal and acoustic pattern.
The system converts the voice in to component frequency and analyzes how they are distributed.
Voice print / voice signature constructed by sampling , digitizing and storing several repetitions of
particular phrase.
Voice prints are not recorded words.
Advantages :
o Users do not have to install any devices.
o Easy to use.
o Only with the help of telephones remote user can interact with voice biometric application.
Disadvantages
o Respiratory diseases, throat infection, background noises may affect the systems ability to match a voice
print.
o because health problem illness there is variation in voice even because of weather change it may cause
errors.
KEYSTROKES ((BEHAVIORAL )
Keystroke biometric uses the manner and rhythm of in which an individual types characters on a keyboard
or keypad, for user identification.
Timing Data
Some kind of timing data is also stored which is as follows
Dwell time- Time a key pressed
Flight time - Time between a key-up and the next key down.
So we can say the manner , rhythm and timing data used to develop the unique sample of the user.
Advantages
Keystroke can be captured continuously.
Not just at start time.
Disadvantages
Temporal variation : persons typing varies substantially during a day and between different day.
SIGNATURE & WRITING PATTERN
Signature recognition is a behavioral biometric.
It can be operated in two different ways:
Static: In this mode, users write their signature on paper, digitize it through an optical scanner or a
camera, and the biometric system recognizes the signature analyzing its shape. This group is also
known as "off-line".
Dynamic:
1)In this mode, users write their signature in a digitizing tablet, which acquires the signature in real
time. Another possibility is the acquisition by means of stylus-operated PDAs.
2)Some systems also operate on smart-phones or tablets with a capacitive screen, where users can
sign using a finger or an appropriate pen.
3)Dynamic recognition is also known as "on-line".
Dynamic information usually consists of the following information:
spatial coordinate x(t)
spatial coordinate y(t)
pressure p(t)
inclination in(t)
pen up/down
ACCESS CONTROLS
Access control is the ability to permit or deny the use of a particular resource by a particular entity.
Access control mechanisms can be used in managing physical resources, logical resources, or digital
resources.
ACCESS CONTROLS
• Authentication
• Authorization
• Audit
ACCESS CONTROLS
An access control mechanism mediates between a user and system resources(such as applications,
Typically, the authentication function determines whether the user is permitted to access the system at all.
Then the access control function determines if the specific requested access by this user is permitted.
A security administrator maintains an authorization database that specifies what type of access to
The access control function consults this database to determine whether to grant access.
An auditing function monitors and keeps a record of user accesses to system resources .
ACCESS CONTROLS
AUTHENTICATION VS AUTHORIZATION
AUTHENTICATION
Authentication is the process of verifying the communicating entity is claim to be. OR Process of
password
METHODS/TYPES OF AUTHENTICATION
Auditing is needed to detect 1)malicious actions by subjects 2) attempted intrusion 3) system failure
Monitoring is related to audit ,which refers to the examination of the behavior and health of the system and
network to ensure high availability and also act as a security control to detect malicious activities.
Access control is a process by which users are granted access and certain privileges to systems,
resources or information.
Access control is a security technique that regulates who or what can view or use resources in a
computing environment.
TYPES/POLICIES….
With DAC models, the data owner decides on access. DAC is a means of assigning access rights based on rules that
users specify.
DAC systems are generally easier to manage than MAC systems.
The distrusted administrative model puts less of a burden on the administrator.
The administrator is not responsible for setting the permissions on objects and application
Since the administrator does not control all object access, it's possible that permissions can be incorrectly set, possibly
leading to a breach of information.
.
This access control model is called discretionary because individual users or applications have the option of
specifying access control requirements on specific objects that they own
Basically, the owner of the access control object is allowed to decide how they want their data protected or shared.
The primary use of DAC is to keep specific objects restricted from users who are not authorized to access them
end user has complete control over how these permissions are assigned and can change them at will.
DAC allows for a distributed access control system to be used because the owner of the object has the ability to change
the access control permission on objects without regard to a central authority
Discretionary Access Control ..DAC
This is a very common access control model. It is used in UNIX, Windows, Linux, and many other
These systems use an access control list (ACL) to set permissions on access control objects.
The ACL shows which users have access to an object and what they can do with the object.
These ACLs are basically a list of user IDs or groups with an associated permission level.
Mandatory Access Control ..MAC
MAC - MANDATORY ACCESS CONTROL
In a MAC model, access is controlled strictly by the administrator.
Users cannot set permissions themselves, even if they own the object.
Centralized administration makes it easier for the administrator to control who has
access to what. The administrator doesn't have to worry about someone else setting
permissions improperly.
Because of the high-level security in MAC systems, MAC access models are often used in
government systems.
1)A person must be assigned a certain role in order to conduct a certain action, called
a transaction.
transaction.
3)Transaction authorization allows the user to perform certain transactions.. Users won’t be
able to perform transactions other than the ones they are authorized for.
ROLE-BASED ACCESS CONTROL - RBAC
–
BENEFITS OF RBAC STRATEGY
Pre-established authorization policies reduce the mistakes resulting from human error
Teams can easily determine exactly who has access to what at any point in time
IT can spend less time for granting and restricting user access
ROLE-BASED ACCESS CONTROL - RBAC
Role-based access control (RBAC) refers to the idea of assigning permissions to users
based on their role within an organization.
When using RBAC, you analyze the system needs of your users and group them into
roles based on common responsibilities and needs.
You then assign one or more roles to each user and one or more permissions to each
role.