630 likes | 1.39k Views
Access Control Systems & Methodology. Dr. Usman Tariq. What is access control?. Access control is the heart of security Definitions: The ability to allow only authorized users, programs or processes system or resource access
E N D
Access Control Systems & Methodology Dr. Usman Tariq
What is access control? • Access control is the heart of security • Definitions: • The ability to allow only authorized users, programs or processes system or resource access • The granting or denying, according to a particular security model, of certain permissions to access a resource • An entire set of procedures performed by hardware, software and administrators, to monitor access, identify users requesting access, record access attempts, and grant or deny access based on pre-established rules.
Access control nomenclature • Authentication • Process through which one proves and verifies certain information • Identification • Process through which one ascertains the identity of another person or entity • Confidentiality • Protection of private data from unauthorized viewing • Integrity • Data is not corrupted or modified in any unauthorized manner • Availability • System is usable. Contrast with DoS.
How can AC be implemented? • Hardware • Software • Application • Protocol (Kerberos, IPSec) • Physical • Logical (policies)
What does AC hope to protect? • Data - Unauthorized viewing, modification or copying • System - Unauthorized use, modification or denial of service • It should be noted that nearly every networkoperating system (NT, Unix, Vines, NetWare) is based on a secure physical infrastructure
Proactive access control • Awareness training • Background checks • Separation of duties • Split knowledge • Policies • Data classification • Effective user registration • Termination procedures • Change control procedures
Physical access control • Guards • Locks • Mantraps • ID badges • CCTV, sensors, alarms • Biometrics • Fences • Card-key and tokens • Guard dogs
AC & Privacy Issues • Expectation of privacy • Policies • Monitoring activity, Internet usage, e-mail • Login banners should detail expectations of privacy and state levels of monitoring
Varied types of Access Control • Discretionary Access Control (DAC) • Mandatory Access Control (MAC) • Lattice/Role/Task • Formal models: • Biba • Clark/Wilson • Bell/LaPadula • Used set theory to define the concept of a secure state, the modes of access, and the rules for granting access.
Problems with formal models • Based on a static infrastructure • Defined and succinct policies • These do not work in corporate systems which are extremely dynamic and constantly changing • None of the previous models deals with: • Viruses/active content • Trojan horses • Firewalls • Limited documentation on how to build these systems
MAC vs. DAC • Discretionary Access Control • You decided how you want to protect and share your data • Mandatory Access Control • The system decided how the data will be shared
Mandatory Access Control • Assigns sensitivity levels, labels • Every object is given a sensitivity label & is accessible only to users who are cleared up to that particular level. • Only the administrators, not object owners, make change the object level • Generally more secure than DAC • Orange book B-level • Used in systems where security is critical, i.e., military • Hard to program for and configure & implement
Mandatory Access Control (Continued) • Downgrade in performance • Relies on the system to control access • Example: If a file is classified as confidential, MAC will prevent anyone from writing secret or top secret information into that file. • All output, i.e., print jobs, floppies, other magnetic mediamust have to be labeled as to the sensitivity level
Discretionary Access Control • Access is restricted based on the authorization granted to the user • Orange book C-level • Prime use is to separate and protect users from unauthorized data • Used by Unix, NT, NetWare, Linux, Vines, etc. • Relies on the object owner to control access
Access control lists (ACL) • A file used by the access control system to determine who may access what programs and files, • in what method and at what time • Different operating systems have different ACL terms • Types of access: • Read / Write / Create / Execute / Modify / Delete / Rename
Orange Book • DoD Trusted Computer System Evaluation Criteria, DoD 5200.28-STD, • Provides the information needed to classify systems (A,B,C,D), defining the degree of trust that may be placed in them • For stand-alone systems only
Orange book levels • A - Verified protection • A1 • Boeing SNS, Honeywell SCOMP • B - MAC • B1/B2/B3 • C - DAC • C1/C2 • D - Minimal security. Systems that have been evaluated, but failed
Bell-LaPadula • Formal description of allowable paths of information flow in a secure system • Used to definesecurity requirements for systems handling data at different sensitivity levels • *-property -prevents write-down, • by preventing subjects with access to high level data from writing the information to objects of lower access
Bell-LaPadula • Model defines secure state • Access between subjects, objects in accordance with specific security policy • Model central to TCSEC (TCSEC is an implementation of the Bell-LaPadula model) • Bell-LaPadula model only applies to secrecy of information • identifies paths that could lead to inappropriate disclosure Trusted Computer System Evaluation Criteria (TCSEC)
Biba Integrity Model • Biba model covers integrity levels, which are analagous to sensitivity levels in Bell-LaPadula • Integrity levels cover inappropriate modification of data • Prevents unauthorized users from making modifications (1st goal of integrity) • Read Up, Write Down model - Subjects cannot read objects of lesser integrity, subjects cannot write to objects of higher integrity
Clark & Wilson Model • An Integrity Model, like Biba • Addresses all 3 integrity goals • Prevents unauthorized users from making modifications • Maintains internal and external consistency • Prevents authorized users from making improper modifications • T - cannot be Tampered with while being changed • L - all changes must be Logged • C - Integrity of data is Consistent
Clark & Wilson Model • Proposes “Well Formed Transactions” • perform steps in order • perform exactly the steps listed • authenticate the individuals who perform the steps • Calls for separation of duty
Problems with the Orange Book • Based on an old model, Bell-LaPadula • Stand alone, no way to network systems • Systems take a long time (1-2 years) to certify • Any changes (hot fixes, service packs, patches) break the certification • Has not adapted to changes in client-server and corporate computing • Certification is expensive • For the most part, not used outside of the government sector
Red Book • Used to extend the Orange Book to networks • Actually two works: • Trusted Network Interpretation of the TCSEC (NCSC-TG-005) • Trusted Network Interpretation Environments Guideline: Guidance for Applying the Trusted Network Interpretation (NCSC-TG-011)
Authentication 3 types of authentication: • Something you know - Password, PIN, mother’s maiden name, passcode • Something you have - ATM card, smart card, token, key, ID Badge, driver license, passport • Something you are - Fingerprint, voice scan, iris scan, retina scan, DNA
Multi-factor authentication • 2-factor authentication. To increase the level of security, many systems will require a user to provide 2 of the 3 types of authentication. • ATM card + PIN • Credit card + signature • PIN + fingerprint • Username + Password (NetWare, Unix, NT default) • 3-factor authentication -- For highest security • Username + Password + Fingerprint • Username + Passcode + SecurID token
Problems with passwords • Insecure - Given the choice, people will choose easily remembered and hence easily guessed passwords such as names of relatives, pets, phone numbers, birthdays, hobbies, etc • Easily broken - Programs such as crack, SmartPass, PWDUMP, NTCrack & l0phtcrack can easily decrypt Unix, NetWare & NT passwords. • Dictionary attacks are only feasible because users choose easily guessed passwords! • Inconvenient - In an attempt to improve security, organizations often issue users with computer-generated passwords that are difficult, if not impossible to remember • Repudiceable - Unlike a written signature, when a transaction is signed with only a password, there is no real proof as to the identity of the individual that made the transaction
Midterm Exam Topics • Understanding of Information Security • Security Goals • Requirements • Threat Models • Defensive Approaches • Legal, Ethical and Professional Issues in Information Security • Phishing Attack • Taxonomy of Crypto • Data Encryption Standard • Access Control
Classic password rules • The best passwords are those that are both easy to remember and hard to crack using a dictionary attack. • The best way to create passwords that fulfill both criteria is to use two small unrelated words or phonemes, ideally with a special character or number. Good examples would be hex7goop or – typetin • Don’t use: • common names, DOB, spouse, phone #, etc. • word found in dictionaries • password as a password • systems defaults
MD-5 Hashing 9e7b87702065188f39fd481b9cbcdb7a Usman Tariq Password management • Configure system to use string passwords • Set password time and lengths limits • Limit unsuccessful logins • Limit concurrent (parallel) connections • Enabled auditing • How policies for password resets and changes • Use last login dates in banners
Password Attacks • Brute force • Mimicking • Dictionary • Crack • John the Ripper • Trojan horse login program
Trojan horse • A Trojan horse can be deliberately attached to otherwise useful software by a cracker, or it can be spread by tricking users into believing that it is a useful program. • The Trojan horse is typically a Windows executable program file, and must have an executable file extension such as .exe, .com, .scr, .bat, or .pif. • Since Windows is configured by default to hide extensions from a user, the Trojan horse's extension might be "masked" by giving it a name such as 'Readme.txt.exe'. With file extensions hidden, the user would only see 'Readme.txt' and could mistake it for a harmless text file.
Types of Trojan Horse • Erasing or overwriting data on a computer • Corrupting files in a subtle way • Spreading other malware, such as viruses. In this case the Trojan horse is called a 'dropper'. • Setting up networks of zombie computers in order to launch DDoS attacks or send Spam. • Logging keystrokes to steal information such as passwords and credit card numbers (known as a key logger) • Phish for bank or other account details, which can be used for criminal activities. • Installing a backdoor on a computer system.
How you can be Infected • Websites: You can be infected by visiting a rogue website. Internet Explorer is most often targeted by makers of Trojans and other pests. Even using a secure web browser, such as Mozilla's Firefox, if Java is enabled, your computer has the potential of receiving a Trojan horse. • Instant message: Many get infected through files sent through various messengers. This is due to an extreme lack of security in some instant messengers, such of AOL's instant messenger. • E-mail:Attachments on e-mail messages may contain Trojans. Trojan horses via SMTP.
Trojan horses Distribution • can be installed through the following methods: • Software downloads • Bundling (e.g. a Trojan horse included as part of a software application downloaded from afile sharing network) • Email attachments • Websites containing executable content (e.g., a Trojan horse in the form of anActiveXcontrol) • Application exploits (e.g., flaws in a Web browser, media player, instant-messaging client, or other software that can be exploited to allow installation of a Trojan horse)
What attacker wants? • Credit Card Information (often used for domain registration, shopping with your credit card) • Any accounting data (E-mail passwords, Dial-Up passwords, WebServices passwords, etc.) • Email Addresses (Might be used for spamming, as explained above) • Work Projects (Steal your presentations and work related papers) • Children's names/pictures, Ages (pedophile attacker?!) • School work (steal your papers and publish them with his/her name on it)
Biometrics • Authenticating a user via human characteristics • Using measurable physical characteristics of a person to prove their identification • Fingerprint • signature dynamics • Iris • retina • voice • face • DNA, blood
Advantages of fingerprint based biometrics • Can’t be lent like a physical key or token and can’t be forgotten like a password • Good compromise between ease of use, template size, cost and accuracy • Fingerprint contains enough inherent variability to enable unique identification even in very large (millions of records) databases • Basically lasts forever • Makes network login & authentication effortless
Biometric Disadvantages • Still relatively expensive per user • Companies & products are often new & immature • No common Application programming interface (API) or other standard • Some hesitancy for user acceptance
Biometric privacy issues • Tracking and surveillance - Ultimately, the ability to track a person's movement from hour to hour • Anonymity - Biometric links to databases could dissolve much of our anonymity when we travel and access services • Profiling - Compilation of transaction data about a particular person that creates a picture of that person's travels, preferences, affiliations or beliefs
Practical biometric applications • Network access control • Staff time and attendance tracking • Authorizing financial transactions • Government benefits distribution (Social Security, welfare, etc.) • Verifying identities at point of sale • Using in conjunction with ATM , credit or smart cards • Controlling physical access to office buildings or homes • Protecting personal property • Prevent against kidnapping in schools, play areas, etc. • Protecting children from fatal gun accidents
Tokens • Used to facilitate one-time passwords • Physical card • SecurID • S/Key • Smart card • Access token
Single sign-on • User has one password for all enterprise systems and applications • That way, one strong password can be remembered and used • All of a users accounts can be quickly created on hire, deleted on dismissal • Hard to implement and get working • Kerberos, CA-Unicenter, Memco Proxima, IntelliSoftSnareWorks, Tivoli Global Sign-On, x.509
Kerberos • Part of MIT’s Project Athena • Kerberos is an authentication protocol used for network wide authentication • All software must be kerberized • Tickets, authenticators, key distribution center (KDC)
Kerberos roles • KDC divided into Authentication Server & Ticket Granting Server (TGS) • Authentication Server - authenticate the identities of entities on the network • TGS - Generates unique session keys between two parties. • Parties then use these session keys for message encryption
Kerberos authentication • User must have an account on the KDC • KDC must be a trusted server in a secured location • Shares a DES key with each user • When a user want to access a host or application, they request a ticket from the KDC via klogin & generate an authenticator that validates the tickets • User provides ticket and authenticator to the application, which processes them for validity and will then grant access.
Problems with Kerberos • Each piece of software must be kerberized • Requires synchronized time clocks • Relies on User Datagram Protocol (UDP) which is often blocked by many firewalls • Kerberos v4 binds tickets to a single network address for a hosts. Host with multiple NIC’s will have problems using tickets