1 / 30

Access Control Systems

Access Control Systems. A means of ensuring a system’s C.I.A given the threats, vulnerabilities, & risks its infrastructure. Rationale. Confidentiality Info not disclosed to unauthorized persons or processes Integrity Internal consistency External consistency Availability Reliability

Download Presentation

Access Control Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Access Control Systems A means of ensuring a system’s C.I.A given the threats, vulnerabilities, & risks its infrastructure

  2. Rationale • Confidentiality • Info not disclosed to unauthorized persons or processes • Integrity • Internal consistency • External consistency • Availability • Reliability • Utility

  3. Systems • Complex • Interact with other systems • Have emergent properties that their designers did not intend • Have bugs

  4. Systems & Security • Usual coping mechanism is to ignore the problem…WRONG • Security is system within larger system • Security theory vs security practice • Real world systems do not lend themselves to theoretical solutions • Must look at entire system & how security affects

  5. The Landscape • Secure from whom? • Secure against what? • Never black & white • Context matters more than technology • Secure is meaningless out of context

  6. Completely Secure Servers • Disconnect from Network • Power Down • Wipe & Degauss Memory & Harddrive • Pulverize it to dust • Threat Modeling • Risk management

  7. Concepts in planning • Threat • Potential to cause harm • Vulnerability • Weakness or lack of safeguard that can be exploited by threat • Risk • Potential for loss or harm • Probability that threat will materialize

  8. Threats • Attacks are exceptions • Digital Threats mirror Physical • Will become more common, more widespread, harder to catch due to: • Automation • Action at a Distance • Every two points are adjacent • Technical Propagation

  9. Threats • All types of attackers • All present some type of threat • Impossible to anticipate • all attacks or • all types of attackers or • all avenues of attack • Point is not to prevent all but to “think about and analyze threats with greater depth and to take reasonable steps to prevent…”

  10. Attacks • Criminal • Fraud-prolific on the Internet • Destructive, Intellectual Property • Identity Theft, Brand Theft • Privacy: less and less available • people do not own their own data • Surveillance, Databases, Traffic Analysis • Echelon, Carnivore • Publicity & Denial of Service • Legal

  11. Controls • Implemented to mitigate risk & reduce loss • Categories of controls • Preventative • Detective • Corrective

  12. Control Implementation types • Administrative: polices, procedures, security awareness training, background checks, vacation history review • Logical / Technical – encryption, smart cards, ACL • Physical – guards, locks, protection of transmission media, backup

  13. Models for Controlling Access • Control: Limiting access by a subject to an object • Categories of controls • Mandatory Access Control (MAC) • Clearance, sensitivity of object, need to know • Ex: Rule-based • Discretionary Access Control (DAC) • Limited ability for Subject to allow access • ACL, access control triple: user, program, object or file • Non-Discretionary Access Control • Central authority determines access

  14. SELinux MAC • Mandatory Access Control in kernel • Implemented via: • type enforcement (domains) • Role based access control • No user discretionary access control • Each process, file, user, etc has a domain & operations are limited within it • Root user can be divided into roles also

  15. Control Combinations • Preventative / Administrative • Preventative / Technical • Preventative / Physical • Detective / Administrative • Detective / Technical • Detective / Physical

  16. Access Control Attacks • DoS, DDos • Buffer Overflow, SYN Attack, Smurf • Back door • Spoofing • Man-in-the-Middle • Replay • TCP Hijacking • Software Exploitation: non up to date software • Trojan Horses

  17. Social Engineering • Ex: emails or phone calls from “upper mgt or administrators” requesting passwords • Dumpster Diving • Password guessing: L0phat • Brute force • Dictionary attack

  18. System Scanning • Collection of info about a system • What ports, what services running, what system software, what versions being used • Steps: • Network Reconnaissance • Gaining System Access • Removing Evidence of attack • Prevention • Watch for scans &/or access of common unused ports

  19. Penetration Testing • “Ethical hacking” • Network-based IDS • Host-based IDS • Tests • Full knowledge, Partial knowledge, Zero knowledge • Open box – Closed box

  20. Penetration Testing Steps • GET APPROVAL from upper mgt • Discovery • Enumeration of tests • Vulnerability mapping • Exploitation • Reporting

  21. Identification & Authentication • ID: subject professing who they are • Auth: verification of ID • Three types of authentication • Something you know • Something you have • Something you are • Two-factor is way the best

  22. Passwords • Static • Dynamic • Passphrase • Dictionary words • Alpha numeric special character • Models for choosing • Rotation schedules for passwords

  23. Biometrics • Fingerprint, palm, retina, iris, face, voice, handwritting, RFID, etc • Enrollment time (2 min) • Throughput rate (10 subjects/min) • Corpus: Collection of biometric data

  24. Biometrics • False Rejection Rate (FRR) • False Acceptance Rate (FAR) • Crossover Error Rate (CER) FAR FRR CER

  25. Single Sign On (SSO) • One id / password per session regardless of the # of systems used • Advantages • Ease of use, Stronger passwords/biodata, easier administration, lower use of resources • Disadvantages • If access control is broken is a MUCH bigger problem

  26. SSO Example: Kerberos • User enters id/pass • Client requests service • Ticket is encrypted with servers public key and sent to client • Client sends ticket to server & requests service • Server responds Problems: replay, compromised tickets

  27. Access Control • Centralized • Remote Authentication & Dial-In (Wireless) User Service (RADIUS) • Call back • De-centralized • Relational Databases (can be both) • Relational concepts • Security issues

  28. Intrusion Detection Systems • Network Based • Monitors Packets & headers • SNORT • Will not detect attacks same host attacks • Host based • Monitors logs and system activity • Types • Signature based (slow attacks problem) • Statistical Anomaly Based

  29. Other issues • Costs • Privacy • Accountability • Compensation for violations • Backups • RAID (Redundant Array of Independent Disks) • Fault tollerance • Business Continuity Planning • Insurance

  30. References • Building Secure Linux Servers (0596002173) • Secrets and Lies ( 0471253111)

More Related