Documente Academic
Documente Profesional
Documente Cultură
Access Control:
(a) Access Rights and Permissions o Objects such as printers, files and other resources need a protection mechanisms, so that cannot be viewed or modified in an unauthorized manner. o Access Control(s): Is the heart of access rights and permissions Specifies what a user can and cannot do Are implemented to insure confidentiality, integrity and Availability. Are the countermeasure for ensuring that only those users with the proper need proper authority can accesses the resources. (b) Establishment or authorization o for Authorization to occur the following must be known File and data owners, custodians, and users- All information generated or used must have a designated owner. The owner determines the appropriate classification and access controls. The owner is also responsible for ensuring appropriate controls for the storage, handling , and distribution of the data. Custodians receive permission from the owners and manage the everyday care of the data such as backups. Users are the subject that requires data ( the object) to perform their jobs. Principle of least privilege A user be given no more privilege than necessary to perform a job. Ensuring the least privilege requires identifying what the users job is, determining the minimum set of privileges required to perform that job, and restricting the user to a domain with only necessary privileges. Segregation of duties and responsibilities- Requires that for particular sets of transactions , no single individual be allowed to execute transactions within the set. The transactions can either be static or dynamic. Establishment is also known as authorization Is dependent upon authentication Determine whether a principle is trusted for an operation (c) Maintenance access control is accomplished via three main categories of access control: o Administrative Policies and procedures, personal controls, supervisor structure , security and awareness training , Testing o Physical Network segregation, perimeter security, computer controls, work are separation, data backups, cabling.
Page 1 of 23
Page 2 of 23
(d) PINS o Personal identification numbers are nothing more than secret numeric passwords. o To login, a user enters their PIN into the token device. o The token device then generates a One-Time Password (OTP) (e) Pass Phrases o A pass phrase is a different form of password o Passwords use a single word o Pass phrases use multiple words o Pass phrases are usually significantly longer than passwords, but are easier to remember than complex passwords. (f) Characterstics-Based Access Control : o Characteristics-based access control identifies a person based on their physical, physiological or behavioral characteristics. (g) Biometrics o Order of effectiveness from most to least secure Iris scanning ,Retinal scanning, Hand Geometry, Fingerprint verification, Voice Recognition, Facial Recognition, Signature Verification, Keystroke Recognition. (h) Behavior based biometrics are less expensive o Voice recognition, Signature Verification, Keystroke recognition o Physiological biometrics offer greater accuracy Fingerprints, hand geometry, Retinal scanning, Iris scanning, Facial recognition. (i) Single Sign-On (SSO): o SSO systems Kerberos and Sesame o In single sign-on a user is identified only once to a central system. o Future access to other systems is forwarded by the central system. o Pros More efficient user log-on process The ability to use stronger passwords Page 5 of 23
Page 6 of 23
(j) Tickets o are the basis of the single sign-on system Service tickets, Renewable Tickets, Ticket granting tickets, Forwardable tickets. (k) Thin Clients o Advantages - centralized administration, lower technology cost, centralized access control, Reduction in viral infections. o Disadvantages:- Users accustomed to powerful desktop workstations, users limited to only production software. o Thin clients are simple inexpensive client devices Processing is accomplished on the centralized system- Mainframe. Thin client technology is referred to as Network computers. (l) Scripts o Scripts enable logging on to multiple software systems easier. o Scripts are stored in a central location and downloaded when a client logs in o All automation is on the client side ( no changes to software). (j) Memory Card o Memory cards have no microprocessor o They cannot manipulate data contained in them. o Store around 4MB to 320MB of data (nonvolatile) o Data stored in an encrypted fashion. o Less expensive than smart cards. (j) Smart Card o Pros Capability to store information with high degree of security and portability. Hacker resistant storage. Provide multi-factor authentication. Offer an enterprise wide authentication system because the user can use the card for all authentication mechanisims. o Cons Susceptible to invasive or non-invasive attacks. Invasive attacks on the card render it inoperative Page 7 of 23
Techniques:
(a) DAC
Page 8 of 23
Restricted access based on the authorization granted to the user. Separation and protection of prime users from unauthorized data. Use by Unix, NT, Netware, Linux and Vines Reliance on the object owner to control access.
o Decisions are based on privilege(clearance) of subject (user) and sensitivity (classification) of an object(file) through the use of labeling. o Example Military classifies a document at secret. A user can be granted the secret privilege and have accesses to objects with this classification a document at secret. A user can be granted the secret privilege and have accesses to objects with this classification or lower as long as they have a need to know . o MAC is more secure than DAC o Military installation , define MAC use. (c) Lattice-Based Access Control o Lattice controls use an upper and lower boundary for access control. (d) Rule-Based Access Control o Rule-based access control is a type of MAC because the access to data is determined by rules or the use of classification label, and not by the identity of the subjects and objects alone. o Rule-based access controls are determined by rules(classification labels), not by the identity of the subjects or objects alone. o Usually based on a specific profile for each user. Page 9 of 23
(f) Restricted Interfaces : Three types of restricted interfaces o Menus and Shells Users are only given the option of the commands they can execute. o Database views- Users access to data is restricted by mechanisms. o Physically constrained interfaces User access is limited by providing certain keys on a keypad or touch buttons on a screen. (g) Non-Discretionary Access Control : o Non-discretionary access control (DAC) uses a central authority to determine what subjects can access which subjects. o Useful when personal changes are frequent. o
Page 10 of 23
o (h)Access Control Lists (ACLs) : o ACLs permit or deny access based on permission on a list. ACLs are basically a table of permission dictating which subjects can access which objects, such as file or directory. Basic types of access read/write/create/execute/modify, delete and rename. (i) Security Models :Bell-La Padula: o Simple Security Property (SS)- States that reading of information by a subject at a lower level from an object at a higher level is not permitted(no read up). o * property (star property):- States that writing of information by a subject at a higher level to an object at a lower level is not permitted.( no write down). o Discretionary Security property(DS): Uses an access matrix to specify discretionary access controls. o This model prevents users and processes from reading above their security level. In addition it prevents processes within any given classification from writing data associated with a lower classification. The no write down prevents placing data that is not sensitive , but that is contained in a sensitive document into a less sensitive file. o The BLP model addresses concerns about system security and leakage of classified information.
Page 11 of 23
o Simple integrity Axiom- states that a subject at one level of integrity is not permitted to observe(read) an object of a lower integrity(no read down). o *(star) Integrity Axiom- states that an object at one level of integrity is not permitted to modify (write to ) an object of a higher level of integrity(no write up). o For example - if a process can write above its security level , trustworthy data could contaminated by the addition of less trustworthy data. o A subject of one level of integrity cannot invoke a subject at a higher level of integrity. o Biba model uses a lattice of integrity levels . (i) Security Models :Clark-Wilson model emphasizes integrity, both internal and external consistency. o Clark-Wilson uses well-formed transactions, separation of duties, and the labeling of subjects and objects with programs to maintain integrity. o Clark-Wilson identifies three rules of integrity. Unauthorized users should make no changes. The system should maintain internal and external consistency. Authorized users should make no unauthorized changes. o There are two mechanisms used to enforce integrity in the Clark-Wilson model: Well-formed transactions- Data and data processes can only be changed by a specific set of trusted programs. Users then have accesses to the programs and not the data directly. Page 12 of 23
(i) Non-Interference -
Page 13 of 23
The subject is any entity , either a user or application , capable of accessing an object. An object is anything that is controlled, such as files, databases , and programs. The access matrix is used to define access rights and capabilities that subjects have over objects, such as read, write, execute, or delete.
Page 14 of 23
Examples of least privilege o Ensure that only a minimal set of users have root or administrator access. Page 15 of 23
(Q) Control Zone : - A control zone is used to defeat capture of emanating electrical signals. A control zone defeats this type of attack as the control zone creates a security perimeter that is constructed to protect against unauthorized access to data or the compromise of sensitive information.
Centralized: A centralized access control model uses a single entity that grants
access to resources. Example RADIUS, TACACS+ Benefits A consistent and uniform method of controlling users access rights. A scalable solution where access control is centralized. RADIUS (Remote Authentication Dial-in User Service) A client/server protocol and software that enables RAS to communicate with a central server to authenticate dial-in users and authorize their access to requested systems. It can be used with TACACS+ and Kerberos and provides PAP or CHAP remote node authentication. Ports UDP 1812 (authentication) and 1813 accounting. Encrypts only the password TACACS+ (Terminal Access Control Access Control System Plus) An authentication protocol that allows a RAS to forward a users logon credentials to an authentication server. TACACS is an unencrypted protocol, and therefore , less secure than the later TACACS+ and RADIUS protocols. o TACACS+ Cisco proprietary handling authentication, authorization and accounting messages. o It uses a two-factor password authentication mechanisms o The user has ability to change password. o It uses TCP port 49 o It encrypts entire payload Page 16 of 23
Decentralized:
to resources. o A decentralized model include o Domains- A set of objects and subjects that have access rights for defined operations. o Trust- A trusted-computer system: all objects/subjects/operations OK.
o IDS identify any of the following types of intrusions. Input validation errors Buffer overflow Boundary conditions Accesses validation errors Exceptional condition handling errors. Environmental errors. Configuration errors. Race conditions. Attacks against IP, passwords, DOS or DDOS, man-in-themiddle, port redirection, viruses and Trojan horses can be also detected. TEMPEST: stands for Telecommunications Electronics Material protected from
Emanating Spurious Transmissions.
Page 19 of 23
Data Extraction : Extracting data from the network can be accomplished in two ways
with network-based intrusion detection passive extraction and active or inline extraction. o Perform Firewall functions. o Perform IDS functions. Recognition Signatures are the primary method used to recognize intrusions on the network. o Signature types : String signatures Triggers on a particular string in a packet. Atomic signatures Triggers on a single packet condition. Flood signatures Triggers on detected DOS traffic. Page 20 of 23
Page 23 of 23