information systems security access control domain #2

47
Information Systems Security Access Control Domain #2

Upload: jemimah-green

Post on 27-Dec-2015

218 views

Category:

Documents


4 download

TRANSCRIPT

Information Systems Security

Access Control

Domain #2

Objectives

Access control types Identification, authentication, authorization Control models and techniques Single sign-on technologies Centralized and decentralized administration Intrusion Detection Systems (IDS)

Roles of Access Control

Limit System Access Access based on identity, groups,

clearance, need-to-know, location, etc. Protect against unauthorized disclosure,

corruption, destruction, or modification– Physical– Technical– Administrative

Access Control Examples

Physical– Locks, guards

Technical– Encryption, password, biometrics

Administrative– Policies, procedures, security training

Access Control Characteristics

Preventative– Keeps undesirable events from happening

Detective– Identify undesirable events that have happened

Corrective– Correct undesirable events that have happened

Deterrent– Discourage security violations from taking place

Continued

Recovery– Restore resources and capabilities after a

violation or accident Compensation

– Provides alternatives to other controls

Who are You?

Identification – username, ID account # Authentication – passphrase, PIN, bio Authorization – “What are you allowed to do”

Separation of Duties Least Privilege

Authentication

Something you know Something you have Something you are

2-Factor Authentication– Use 2 out of the 3 types of characteristics

Access Criteria

Security Clearance– Mandatory control systems and labels

Need-to-Know– Formal processes– Requirements of role within company for access

Least Privilege– Lease amount of rights to carry out tasks– No authorization creep

Default to “NO ACCESS”

Example Controls

Biometrics– Retina, finger, voice, iris

Tokens– Synchronous and Asynchronous device

Memory Cards– ATM card, proximity card

Smart Cards– Credit card, ID card

Biometric Controls

Uses unique personal attributes Most expensive and accurate Society has low acceptance rate Experience growth after 9-11-2001

Error Types

Type I error– Rejects authorized individuals (False Reject)– Too high a level of sensitivity

Type II error– Accepts imposter (False Accept)– Too low a level of sensitivity

Crossover Error Rate (CER)– JUST RIGHT!!!!!

Biometric Example

Fingerprint– Ridge endings and bifurcations

Finger Scan– Uses less data than fingerprint (minutiae)

Palm Scan– Creases, ridges, and grooves from palm

Hand Geometry– Length and width of hand and fingers

More Biometrics

Retina Scan– Blood vessel pattern on back of eyeball

Iris Scan– Colored portion of eye

Signature Dynamics– Electrical signals of signature process

Keyboard Dynamics– Electrical signals of typing process

More Biometrics

Voice Print– Differences in sound, frequency, and pattern

Facial Scan– Bone structure, nose, forehead size, and eye

width Hand Topology

– Size and width of side of hand

Passwords

Least secure but cheap Should be at least 8 characters and

complex Keep a password history Clipping levels used Audit logs

Password Attacks

Dictionary Attacks– Rainbow tables

Brute Force Attack– Every possible combination

Countermeasures

Encrypt passwords Use password advisors Do not transmit in clear text GREATLY protect central store of

passwords Use cognitive passwords

– Based on life experience or opinions

One-time Passwords

Dynamic Generated for one time use Protects against replay attacks Token devices can generate

– Synchronized to time or event– Based on challenge response mechanism

Not as vulnerable as regular passwords

Passphrase

Longer than a password Provides more protection Harder to guess Converted to virtual password by software

Memory Cards

Magnetic stripe holds data but cannot process data

No processor or circuits Proximity cards, credit cards, ATM cards Added costs compared to other

technologies

Smart Card

Microprocessor and IC Tamperproof device (lockout) PIN used to unlock Could hold various data

– Biometrics, challenge, private key, history Added costs

– Reader purchase– Card generation and maintenance

Single Sign-on (SSO)

Scripting Authentication Characteristics– Carry out manual user authentication– As users are added or changed, more

maintenance is required for each script– Usernames and passwords held in one central

script Many times in clear text

SSO Continued

Used by directory services (x.500) Used by thin clients Used by Kerberos

– If KDC is compromised, secret key of every system is also compromised

– If KDC is offline, no authentication is possible

Kerberos

Authentication, confidentiality, integrity NO Non-availability and repudiation services Vulnerable to password guessing Keys stored on user machines in cache All principles must have Kerberos software Network traffic should be encrypted

SESAME

Secure European System for Application in a Multi-vendor Environment

Based on asymmetric cryptography Uses digital signatures Uses certificates instead of tickets Not compatible with Kerberos

Access Control Threats

DOS Buffer Overflow Mobile Code Malicious Software Password Cracker Spoofing/Masquerading Sniffers

More Access Control Threats

Eavesdropping Emanations Shoulder Surfing Object Reuse Data Remanence Unauthorized Data Mining Dumpster Diving

More Threats

Theft Social Engineering Help Desk Fraud

Access Control Models

Once security policy is in place, a model must be chosen to fulfill the directives– Discretionary access control (DAC)– Mandatory access control (MAC)– Role-based access control (RBAS)

Also called non-discretionary

Discretionary

Used by OS and applications Owner of the resource determines which

subjects can access Subjects can pass permissions to others Owner is usually the creator and has full

control Less secure than mandatory access

Mandatory Access

Access decisions based on security clearance of subject and object

OS makes the decision, not the data owner Provides a higher level of protection

– Used by military and government agencies

Role Based Access Control

Also called non-discretionary Allows for better enforcing most commercial

security policies Access is based on user’s role in company Admins assign user to a role (implicit) and

then assign rights to the role Best used in companies with a high rate of

turnover

Remote Authentication Dial-in User Services (RADIUS)

AAA protocol De facto standard for authentication Open source Works on a client/server model Hold authentication information for access

Terminal Access Controller Access Control System (TACACS)

Cisco proprietary protocol Splits authentication, authorization, and

auditing features Provides more protection for client-to-server

communication than RADIUS TACACS+ adds two-factor authentication Not compatible with RADIUS

Diameter

New and improved RADIUS Users can move between service provider

networks and change their point of attachment

Includes better message transport, proxying, session control, and higher security for AAA

Not compatible with RADIUS

Decentralized Access Control

Owner of asset controls access administration

Leads to enterprise inconsistencies Conflicts of interest become apparent Terminated employees’ rights hard to

manage Peer-to-peer environment

Hybrid Access Control

Combines centralized and decentralized administration methods

One entity may control what users access Owners choose who can access their

personal assets

Ways of Controlling Access

Physical location– MAC addresses

Logical location– IP addresses

Time of day– Only during work day

Transaction type– Limit on transaction amounts

Technical Controls

System access– Individual computer controls– Operating system mechanisms

Network access– Domain controller logins– Methods of access

Network architecture– Controlling flow of information– Network devices implemented

Auditing and encryption

Physical Controls

Network segregation– Wiring closets need physical entry protection

Perimeter security– Restrict access to facility and assets

Computer controls– Remove floppys and CDs– Lock computer cases

Protect Audit Logs

Hackers attempt to scrub the logs Organizations that are regulated MUST

keep logs for a specific amount of time Integrity of logs can be protected with

hashing algorithms Restrict network administrator access

Intruder Detection Systems (IDS)

Software employed to monitor a network segment or an individual computer

Network-based– Monitors traffic on a network segment– Sensors communicate with central console

Host-based– Small agent program that resides on individual

computer– Detects suspicious activity on one system

IDS Placement

In front of firewall– Uncover attacks being launched

Behind firewall– Root out intruders who have gotten through

Within intranet– Detect internal attacks

Type of IDS

Signature-based– Knowledge based– Database of signatures– Cannot identify new attacks– Need continual updating

Behavior-based– Statistical or anomaly based– Creates many false positives– Compares activity to ‘what is normal’

IDS Issues

May not process all packets on large network

Cannot analyze encrypted data Lots of false alarms Not an answers to all problems Switched networks make it hard to examine

all packets

Traps for Intruders

Padded Cell– Codes within a product to detect if malicious

activity is taking place– Virtual machine provides a ‘safe’ environment– Intruder is moved to this environment– Intruder does not realize that he is not is the

original environment– Protects production system from hacking– Similar to honeypots