Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals



Similar documents
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management

CompTIA Security+ Certification SY0-301

Identity Management and Access Control

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Digital Signatures on iqmis User Access Request Form

Section 12 MUST BE COMPLETED BY: 4/22

DFW Backup Software. Whitepaper Data Security

Two-Factor Authentication and Swivel

Introduction to Computer Security

Multi-factor authentication

Blaze Vault Online Backup. Whitepaper Data Security

BM482E Introduction to Computer Security

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Guideline on Access Control

RemotelyAnywhere. Security Considerations

ELPBack Online Backup Whitepaper Data Security Version 5.5.x Jun 2008 Protecting Tomorrow with yesterday ELPBack Offsite Backup Whitepaper Data

HP ProtectTools Windows Mobile

With Great Power comes Great Responsibility: Managing Privileged Users

Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

CITRUS COMMUNITY COLLEGE DISTRICT GENERAL INSTITUTION COMPUTER AND NETWORK ACCOUNT AND PASSWORD MANAGEMENT

Criteria for web application security check. Version

WHITE PAPER Usher Mobile Identity Platform

Edge Metrics Data Center User Manual

Windows Operating Systems. Basic Security

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Management of Hardware Passwords in Think PCs.

WHITE PAPER AUGUST Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

Salesforce1 Mobile Security Guide

GENEVA COLLEGE INFORMATION TECHNOLOGY SERVICES. Password POLICY

MCBDirect Corporate Logging on using a Soft Token

HAI Access Control. The HAI Access Control Card Reader can be used for:

SANS Institute First Five Quick Wins

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

September 25, Programming YubiKeys for Okta Adaptive Multi-Factor Authentication

Security Advice for Instances in the HP Cloud

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Security Implications Associated with Mass Notification Systems

SECURITY DOCUMENT. BetterTranslationTechnology

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Likewise Security Benefits

White Paper: Whole Disk Encryption

Password Manager with 3-Step Authentication System

SECURING YOUR REMOTE DESKTOP CONNECTION

Access Control Intro, DAC and MAC. System Security

Integrated Identity Management Whitepaper

Ensuring the security of your mobile business intelligence

HIPAA Security. assistance with implementation of the. security standards. This series aims to

RFID Security. April 10, Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

89 Fifth Avenue, 7th Floor New York, NY White Paper. How to Avoid the High Cost of Security Audits

Kaspersky Lab s Full Disk Encryption Technology

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

PROTECTING SYSTEMS AND DATA PASSWORD ADVICE

THE FUTURE OF MOBILE SECURITY

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

TOPIC HIERARCHY. Distributed Environment. Security. Kerberos

Introduction to Computer Security

Introduction to Computer Security

Physical Security to mitigate Social Engineering Risks

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

M&T Web InfoPLU$ GETTING STARTED GUIDE

User Identification and Authentication Concepts

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Ahsay Online Backup. Whitepaper Data Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

How Drive Encryption Works

Using GhostPorts Multi-Factor Authentication

USFSP Network Security Guidelines

Physical Security: From Locks to Dox

Security Controls for the Autodesk 360 Managed Services

Potential Targets - Field Devices

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

How to login with the RSA Token?

Microsoft.NET Passport, a solution of single sign on

White Paper. Authentication and Access Control - The Cornerstone of Information Security. Vinay Purohit September Trianz 2008 White Paper Page 1

iphone in Business Security Overview

Data Superhero Online Backup Whitepaper Data Security

RSA Authentication Manager 7.1 Basic Exercises

Convenience and security

User Management Guide

How do I contact someone if my question is not answered in this FAQ?

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

EASTERN OKLAHOMA STATE COLLEGE ACCEPTING AND HANDLING CREDIT AND DEBIT CARD PAYMENTS POLICIES AND PROCEDURES

FORBIDDEN - Ethical Hacking Workshop Duration

Cigital. Paco Hope, Technical Manager

B.A.S.I.S. G and V Offline Setup Guide

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Transcription:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals

Objectives Define access control and list the four access control models Describe logical access control methods Explain the different types of physical access control 2

Access control What Is Access Control? The process by which resources or services are granted or denied on a computer system or network There are four standard access control models as well as specific practices used to enforce access control 3

Access Control Terminology Identification A user accessing a computer system would present credentials or identification, such as a username Authentication Checking the user s credentials to be sure that they are authentic and not fabricated Authorization Granting permission to take the action A computer user is granted access To only certain services or applications in order to perform their duties 4

Access Control Terminology (continued) 5

Access Control Terminology (continued) Computer access control can be accomplished by one of three entities: hardware, software, or a policy Access control can take different forms depending on the resources that are being protected Other terminology is used to describe how computer systems impose access control: Object Subject Operation 6

Access Control Terminology (continued) 7

8

Access Control Models Access control model Provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications Once an access control model is applied Custodians can configure security based on the requirements set by the owner So that end users can perform their job functions 9

Access Control Models (continued) There are four AC models: Mandatory Access Control (MAC) model Discretionary Access Control (DAC) model Role Based Access Control (RBAC) model Rule Based Access Control (RBAC) model 10

Access Control Models (continued) Mandatory Access Control (MAC) model The end user cannot implement, modify, or transfer any controls The owner and custodian are responsible for managing access controls This is the most restrictive model because all controls are fixed In the original MAC model, all objects and subjects were assigned a numeric access level The access level of the subject had to be higher than that of the object in order for access to be granted 11

Access Control Models (continued) Discretionary Access Control (DAC) model The least restrictive A subject has total control over any objects that he or she owns Along with the programs that are associated with those objects In the DAC model, a subject can also change the permissions for other subjects over objects 12

Access Control Models (continued) Role Based Access Control (RBAC) model Sometimes called Non-Discretionary Access Control Considered a more real world approach than the other models Assigns permissions to particular roles in the organization, and then assigns users to that role Objects are set to be a certain type, to which subjects with that particular role have access 13

Access Control Models (continued) Rule Based Access Control (RBAC) model Also called the Rule-Based Role-Based Access Control (RB-RBAC) model or automated provisioning Can dynamically assign roles to subjects based on a set of rules defined by a custodian Each resource object contains a set of access properties based on the rules Rule Based Access Control is often used for managing user access to one or more systems 14

Access Control Models (continued) 15

Practices for Access Control Separation of duties Requires that if the fraudulent application of a process could potentially result in a breach of security Then the process should be divided between two or more individuals Job rotation Instead of one person having only responsibility for a function, individuals are periodically moved from one job responsibility to another 16

Practices for Access Control Least privilege (continued) Each user should be given only the minimal amount of privileges necessary to perform his or her job function Implicit deny If a condition is not explicitly met, then it is to be rejected 17

Logical Access Control Methods The methods to implement access control are divided into two broad categories Physical access control and logical access control Logical access control includes access control lists (ACLs), group policies, account restrictions, and passwords 18

Access Control Lists (ACLs) Access control list (ACL) A set of permissions that is attached to an object Specifies which subjects are allowed to access the object And what operations they can perform on it These lists are most often viewed in relation to files maintained by the operating system The structure behind ACL tables is a bit complex Access control entry (ACE) Each entry in the ACL table in the Microsoft Windows, Linux, and Mac OS X operating systems Security+ Guide to Network Security Fundamentals 19

Access Control Lists (ACLs) (continued) File-A File-B File-C User1 Read, write Read, write Read User2 Read Administrator Read, write, execute Read, write, execute Read, write, execute 20

Account Restrictions Time of day restrictions Limit when a user can log on to a system These restrictions can be set through a Group Policy Can also be set on individual systems Account expiration The process of setting a user s account to expire Orphaned accounts are user accounts that remain active after an employee has left an organization Can be controlled using account expiration 21

22

23

Passwords Password The most common logical access control Sometimes referred to as a logical token A secret combination of letters and numbers that only the user knows 24

Passwords (continued) Passwords are considered weak because: A password should never be written down. Must also be of a sufficient length and complexity so that an attacker cannot easily guess it (password paradox) Users have 20 or more accounts that needs passwords. Because of humans limited memorizing force users to use weak passwords. There are several password myths. 25

Passwords (continued) 26

Passwords (continued) Attacks on passwords: Brute force attack Dictionary attack Rainbow tables 27

Passwords (continued) Attacks on passwords Brute force attack Simply trying to guess a password through combining a random combination of characters. By changing one character at a time, using each newly generated password to access the system Passwords typically are stored in an encrypted form called a hash Attackers try to steal the file of hashed passwords and then break the hashed passwords offline 28

Passwords (continued) Time calculations: Four digit = 10x10x10x10 = 10,000 (0.01 Second) Four capital letters = 26x26x26x26 = 456,976 (.45 Second) Four capital and small letters = 52x52x52x52 = 7,311,616 (7.3 Seconds) Four digit, capital and small letters= 62x62x62x62 = 14,776,336 (14.7 Seconds) Four digit, special character (10), capital and small letters = 72x72x72x72 = 1,934,917,632 (32 Minutes) Eight digit, special character (10), capital and small letters = 72x72x72x72x72x72x72x72= 722,204,136,308,736 (23 Years) 29

Passwords (continued) Attacks on passwords (continued) Dictionary attack Begins with the attacker creating hashes of common dictionary words And compares those hashed dictionary words against those in a stolen password file 30

31

Passwords (continued) Attacks on passwords (continued) Rainbow tables Make password attacks easier by creating a large pregenerated data set of hashes from nearly every possible password combination Steps for using Rainbow tables: Creating tables. Use the table to crack the password. 32

Passwords (continued) Generating a rainbow table requires a significant amount of time Rainbow table advantages Can be used repeatedly for attacks on other passwords Rainbow tables are much faster than dictionary attacks The amount of memory needed on the attacking machine is greatly reduced 33

Password policy Passwords (continued) A strong password policy can provide several defenses against password attacks The first password policy is to create and use strong passwords One of the best defenses against rainbow tables is to prevent the attacker from capturing the password hashes A final defense is to use another program to help keep track of passwords 34

Physical Access Control Physical access control primarily protects computer equipment Designed to prevent unauthorized users from gaining physical access to equipment in order to use, steal, or vandalize it Physical access control includes computer security, door security, mantraps, video surveillance, and physical access logs We will only cover door security, 35

Door Security Hardware locks Preset lock Also known as the key-in-knob lock The easiest to use because it requires only a key for unlocking the door from the outside Automatically locks behind the person, unless it has been set to remain unlocked Security provided by a preset lock is minimal 36

Door Security (continued) 37

Door Security (continued) Hardware locks (continued) Deadbolt lock Extends a solid metal bar into the door frame for extra security Is much more difficult to defeat than preset locks Requires that the key be used to both open and lock the door 38

Door Security (continued) 39

Door Security (continued) Most organizations observe the following practices: Change locks immediately upon loss or theft of keys Inspect all locks on a regular basis Issue keys only to authorized persons Keep records of who uses and turns in keys Keep track of keys issued, with their number and identification Master keys should not have any marks identifying them as masters 40

Door Security (continued) Most organizations observe the following practices: (continued) Secure unused keys in a locked safe Set up a procedure to monitor the use of all locks and keys and update the procedure as necessary When making duplicates of master keys, mark them Do Not Duplicate, and wipe out the manufacturer s serial numbers to keep duplicates from being ordered 41

Door Security (continued) Door access systems Cipher lock Combination locks that use buttons that must be pushed in the proper sequence to open the door Can be programmed to allow only the code of certain individuals to be valid on specific dates and times Cipher locks also keep a record of when the door was opened and by which code Cipher locks are typically connected to a networked computer system Can be monitored and controlled from one central location 42

43

Door Security (continued) Door access systems (continued) Cipher lock disadvantages Basic models can cost several hundred dollars while advanced models can be even more expensive Users must be careful to conceal which buttons they push to avoid someone seeing or photographing the combination (shoulder surfing) 44

Door Security (continued) Door access systems (continued) Tailgate sensor Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway Some beams are activated and then other beams are activated a short time later Can detect if a second person walks through the beam array immediately behind ( tailgates ) the first person Without presenting credentials 45

Door Security (continued) 46

Door Security (continued) Physical tokens Objects to identify users ID badge The most common types of physical tokens ID badges originally contains a magnetic strip that is swiped or scand to identify users Today, ID badges can be fitted with tiny radio frequency identification (RFID) tags Can be read by an RFID transceiver as the user walks through the door with the badge in her pocket 47

Door Security (continued) 48

Door Security (continued) RFID can be: Passive RFID: No power supply. Small in size and send very small data. Small range (19 ft) Active RFID: Has power supply. Larger in size and can store additional data. Larger range (98 ft) 49

Summary Access control is the process by which resources or services are denied or granted Best practices for implementing access control include separation of duties, job rotation, using the principle of least privilege, and using implicit deny Logical access control methods include using access control lists (ACLs), which are provisions attached to an object Passwords, sometimes known as logical tokens, are a secret combination of letters and numbers that only the user should know 50

Summary (continued) Physical access control attempts to limit access to computer equipment by unauthorized users 51