38
CSE 4482 Computer Security Management: Assessment and Forensics Instructor: N. Vlajic, Fall 2013 Protection Mechanisms: Access Control

Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

CSE 4482 Computer Security Management:

Assessment and Forensics

Instructor: N. Vlajic, Fall 2013

Protection Mechanisms: Access Control

Page 2: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Required reading: Management of Information Security (MIS), by Whitman & Mattord Chapter 10, pp. 333 - 345

Page 3: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Learning Objectives Upon completion of this material, you should be able to:

• List different sphere of data use and different layers of data protection.

• Describe the difference between various access approaches, including authentication, authorization and biometric access controls.

Page 4: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Introduction • Spheres of Use – people can access information directly (hard-copies) and/or by means of computer-network systems

layers on ‘technology’ side of sphere can be accessed directly or indirectly

e.g. to access info stored on a computer, a person must access / log-into the computer’s OS

e.g. to access info via Internet, a person must ‘go through’ local network and then access the system that hosts the info

Page 5: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Introduction (cont.) • Spheres of Protection – between each layer of use there must exist a layer of protection to prevent access to next inner layer

shaded bands in the figure …

(Avoidance) controls that can be applied to humans!

(Avoidance) controls

that can be applied to

technology!

Page 6: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Introduction (cont.) • Types of Protection – protection controls can be generally grouped in following 3 categories:

physical controls - physical mechanisms deployed to detect or prevent direct contact with info assets (locks, alarms, video cameras … )

logical/technical controls - hardware & software mechanisms for managing access and providing protection to info. assets (authentication methods, encryption, access control, firewalls, routers, …)

administrative controls - policies & procedures, hiring & firing practices, background checks, training, …

(Categories of Control)

Page 7: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Introduction (cont.)

Example: Intruder trying to get hold of a company server …

scenario 1: server has strong authentication (technical control ), but is stored on an unguarded desk (physical control )

intruder can easily steal server & take time to hack into the system

scenario 2: server admin. uses strong password (logical control ), but social engineering tricks him into giving up his password (admin. controls )

Page 8: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Introduction (cont.)

• Technical Controls – alone cannot secure an IT environment, but are a critical part of information security programs; include

1) access controls

2) firewalls

3) host and network IDPS

4) auditing, scanning & analysis tools

5) vulnerability / assessment tools

6) encryption

7) backups

Page 9: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Access Controls

Page 10: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

• Access Controls – encompass three processes:

identification – obtain identity of an entity requesting access to a logical or physical area

authentication – confirm identity of the entity seeking access …

making sure the user’s credentials are not fabricated – the user ‘is’ who they claim to be

authorization – determine whether the authenticated entity is permitted to access to a system (OS, firewall, router, database, …) and its resources (e.g., system’s files))

typically implemented by means of access control lists / rules

Access Controls

Page 11: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Access Controls (cont.)

Example: Basic steps in access control

Page 12: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Access Controls (cont.)

Just because an user can authenticate to a system, that does not mean they are given access to anything and everything.

Authorization ensues that the requested object or activity on an

object is possible based on the privileges assigned to the subject.

Page 13: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Identification • Identification – mechanism that provides info about an unverified entity – aka supplicant – that wants to be granted access to a logical or physical area

must be a unique value that can be mapped to one and only one entity within the administered domain

in most organizations, identification = name OR (initial + surname)

Page 14: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

• Authentication – process of validating a person’s (supplicant’s) purported identity

types of authentication mechanisms:

1) something you know

password or passphrases

2) something you have

cryptographic tokens or smart cards

3) something you are – static biometrics

fingerprints, palm prints, iris scans, …

4) something you produce – dynamic biometrics

pattern recognition of voice, hand- writing / signature, typing rhythm

Authentication

Page 15: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication (cont.)

Elementary Computer Security, R. E. Smith, pp. 232

Page 16: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you know …

1) Something you know …

authentication mechanisms based on use of passwords and passphrases

password – combination of characters that only the user should know

challenge: should be simple enough for remembering and complex enough for cracking

bad examples: name of spouse, child, pet

passphrase – plain-language phrase typically longer but stronger than a password, from which a virtual password is derived

examples: Linksys, Windows 7

Page 17: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Example: Password power under brute-force attack

On 2005-era Pentium computer performing 8 million guesses per sec.

Authentication: Thing you know …(cont.)

Page 18: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you have … (cont.) 2) Something you have …

objects used for the purpose of user authentication are called ‘tokens’

token + PIN/password provides significantly greater security than password alone

an adversary must gain physical possession of the token (or be able to duplicate it) in addition to ‘cracking’ the password

types of tokens:

static tokens

dynamic synchronous (one-time password) tokens

dynamic asynchronous (challenge-response) tokens

Page 19: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you have … (cont.) 2.1) Static Tokens

e.g.: swipe card, smart card, RFID tags

swipe cards - ID and ATM cards

aka ‘dumb cards’, transmit the same credential every time – the credential (base secret) is is impractical to memorize

PIN/password not on the card – ATM encrypts PIN provided by user and sends it to a data- base for verification …

smart card - swipe cards with a chip

chip contains a CPU, memory blocks (RAM, ROM, …) and on-chip encryption module

stores 100x data stored on magnetic strip: encrypted PIN & other info about card holder

card checks user’s PIN & generates a certificate to authorize transaction process …

Page 20: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you have … (cont.)

2.2) Synchronous (One-Time Password) Tokens

small LCD device that generates a unique new password periodically (e.g., every 60 seconds)

token combines ‘base secret’ with clock to generate new password

token and authentication server must have their clocks synchronized – which is often a challenge!

Page 21: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you have … (cont.) Example: Synchronous (One-time Password) Token

Page 22: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you have … (cont.)

2.3) Asynchronous (Challenge-Response) Tokens

instead of time, token uses a challenge/nonce provided by the system to generate the password

e.g., token can generate the password by

1) applying a unique hash function to (user’s base secret + nonce)

2) encrypting nonce using user’s/token’s public key

Page 23: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you have … (cont.)

Example: Asynchronous (Challenge-Response) Token

Page 24: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you are …

3) Something you are (Static / Standard Biometrics)

authentication mechanisms that takes advantage of users’ unique physical characteristics

fingerprints

facial characteristics

retina – blood vessel pattern

iris

in contrast to password/token authentic., biometric systems do not look for a 100% match – person’s characteristics are inherently ‘noisy’

pattern recognition must be involved

very effective but costly if a large number of biometric readers need to be installed!

Page 25: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you are … (cont.)

Example: Standard biometrics features

Also see: http://computer.howstuffworks.com/biometrics-privacy.htm

Page 26: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you are … (cont.)

Retina scanner

http://www.nytimes.com/imagepages/2007/11/04/business/04googleCA03ready.html

Iris scanner

http://pinoytutorial.com/techtorial/wp-content/uploads/2010/08/iris-scan.jpg

Fingerprint scanner

http://img.dailymail.co.uk/i/pix/2007/10_03/fingerpMS2010_468x665.jpg

Page 27: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you are … (cont.)

3) Something you are: Biometrics Accuracy

in all biometrics schemes, some physical characteristic of the individual is mapped into digital representation

however, physical characteristics change

facial contours and color may be influenced by clothing, hairstyle, facial hair, …

the results of fingerprint scan may vary as a function of: finger placement, finger swelling and skin dryness …

multiple mappings may have to be taken in order to obtain a (statistically) useful biometric representation

a biometric sensor must be able to adapt to a broad range of appearances

Page 28: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you are … (cont.)

3) Something you are: Biometrics Accuracy (cont.)

unfortunately, range of scores/features for any particular user is likely to overlap with scores/ /features for other users

by moving the ‘decision threshold’, sensitivity of biometric system changes

move t to left ⇒

system more tolerant to noise , but also

system more likely to ‘accept’ wrong person

Page 29: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

3) Something you are: Evaluation of Biometric Systems

Authentication: Thing you are … (cont.)

False Reject Rate (FRR), aka False Negative

percentage of authorized users who are denied access

false negatives do not represent a threat to security but an impedance to legitimate users

False Accept Rate (FAR), aka False Positive

percentage of unauthorized / fraudulent users who are allowed access to system,

represent serious security breach

Crossover Error Rate (CER), aka Equal Error Rate

point at which FRR = FAR – Operating Point of choice for most biometric systems – provides balance between sensitivity & performance

techniques with 1% CER superior to 5% CER

Page 30: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you are … (cont.)

http://fingerchip.pagesperso-orange.fr/biometrics/accuracy.htm

Page 31: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication: Thing you are … (cont.)

3) Something you are: Types of Biometric Systems

systems for IDENTIFICATION

perform 1:n comparison to identify a user from a database of n users

systems for AUTHENTICATION

perform 1:1 comparison to check whether a user matches his profile

Page 32: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

4) Something you produce: Dynamic Biometrics

authentication mechanisms that makes use of something the user performs or produces:

signature recognition

voice recognition (sometimes considered under ‘what you are’)

keystroke pattern recognition

less costly than ‘what you are’ systems, but not as reliable

signature & voice may change significantly with time and under different circumstances

Authentication (cont.)

Page 33: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Example: Dynamic / behavioral biometrics

Authentication that examines normal actions performed by the user, e.g. keystroke dynamics.

Authentication (cont.)

Page 34: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication (cont.)

Example: Cost vs. accuracy of various biometric characteristics

Page 35: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication (cont.)

Example: Orders of effectiveness and acceptance

Organizations implementing biometrics must carefully balance a system’s effectiveness against its perceived intrusiveness and acceptability to users …

Page 36: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication (cont.)

Example: Single- and multi- factor authentication Systems that use one authentication credential (e.g. something you know) are known as one-factor authentication systems.

Most computer systems / applications are one-factor authentication systems – they rely on passwords only.

Systems that require strong protection typically combine multiple authentication mechanisms – e.g. something you have and something you know. They are known as two-factor authentication systems.

For example, access to a bank’s ATM requires a banking card + a personal identification number (PIN).

Page 37: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

Authentication (cont.)

Example: Are Gmail, Hotmail, Yahoo 1- or 2- factor authentication systems?.

Page 38: Protection Mechanisms: Access Control - York University · Authentication (cont.) Example: Single- and multi- factor authentication. Systems that use one authentication credential

• Authorization – process of determining whether an already authenticated user is allowed to access info. resources in a specified way

Authorization

“Although authorization and access are sometimes viewed as synonymous, in access control they are different steps. A computer user may be authorized or granted

permission to log on to a system by presenting valid credentials, yet that authorization does not mean that the user

can access any and all resources.

Being authorized to enter does not always indicate open access; rather, an authorized user is given specific access privileges

regarding what actions they can perform.”

Security+ Guide to Network Security Fundamentals, 4th edition, M. Ciampa, pp. 335