By Matt Norris. Physical Security - Threats -User Authentication Techniques Information Security - Threats -User Authentication Techniques Good Authentication.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Lecture 6 User Authentication (cont)
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Access Control Methodologies
CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Remote Access Network Management Kelly Given Allison Traina.
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Security Awareness: Applying Practical Security in Your World
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Chapter 10: Authentication Guide to Computer Network Security.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Mobile and Wireless Communication Security By Jason Gratto.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
BUSINESS B1 Information Security.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
What does “secure” mean? Protecting Valuables
CIS 450 – Network Security Chapter 8 – Password Security.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Systems Security
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Ingredients of Information Security. - Who has access the asset? - Is the asset correct? - Is the asset accessible? …uncorrupted? …authentic?
Authentication Chapter 2. Learning Objectives Create strong passwords and store them securely Understand the Kerberos authentication process Understand.
Cody Brookshear Andy Borman
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
November 19, 2008 CSC 682 Do Strong Web Passwords Accomplish Anything? Florencio, Herley and Coskun Presented by: Ryan Lehan.
Chap1: Is there a Security Problem in Computing?.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Authentication What you know? What you have? What you are?
Computer Security By Duncan Hall.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Information Systems Design and Development Security Precautions Computing Science.
Understanding Security Policies Lesson 3. Objectives.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Securing Information Systems
Understanding Security Policies
Authentication Schemes for Session Passwords using Color and Images
Secure Software Confidentiality Integrity Data Security Authentication
Radius, LDAP, Radius used in Authenticating Users
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security Barriers Asset Proper Access Attack Security System
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Operating System Concepts
Mohammad Alauthman Computer Security Mohammad Alauthman
Protection Mechanisms in Security Management
G061 - Network Security.
Presentation transcript:

By Matt Norris

Physical Security - Threats -User Authentication Techniques Information Security - Threats -User Authentication Techniques Good Authentication Practices

Types of Security - Physical Security - Information Security

Steps taken to protect a facility, resource, or information from being physically accessed Design concepts to ‘harden’ facilities. - barriers, locks, etc.

Two types of threats - Outsiders - Insiders

Outsider threat – By person(s) who are not part of the target organization – Easier to defend against - gaining entry into an area more difficult - less knowledge of area - less common of two threats

Insider threat – By person(s) who belong to the target organization – More difficult to defend against - Actor is knowledgeable of area, procedures and protocols - most common threat

Guards – posted security personnel at access points - verify authorization to restricted areas (i.e. IDs, Personnel Roster) - physical presence prevent unauthorized access to restricted areas

User authentication controls may be Something you have… Something you know… Something you are…

Something You Have… Locks – restricts access until unlocked or deactivated Padlocks – require key or combination to gain access Weaknesses: 1. duplicate keys 2. easily bypassed

Keycards – scanned through a card reader to gain access to a restricted area Only keycards with authorization can access that area - Role-based access control (RBAC) - Level of access based on role Weakness - stolen keycard

Something You Know… Door Codes – require code to gain entry Keypad on door serves as input device of entry code RBAC – knowledge of code based on role Weakness: Employees writing down code, easily stolen

Something You Are… Biometrics – method of identifying a unique human trait or characteristic as a means of authentication Best type of defense against unauthorized access

How it works: 1) Initial template enrolled in database 2) Later access attempts measured against initial template 3) Template ran against Match Index Decision Criterion(is it close enough?) 4) Template either accepted/rejected

Types of Biometrics - Voice Recognition - Fingerprint/Hand Geometry Scan - Iris/Retinal Scan - Handwriting

Weaknesses: - most expensive - False Accept Rate (FAR): accepting a template that should be rejected - False Reject Rate (FRR): rejecting a template that should be accepted

Information Security – protecting the information stored on computer hardware Prevents unauthorized access to personal information and data

Password/Key Crackers – tries a combination of usernames and passwords until password is discovered 3 types of cracking techniques - Brute Force Attack - Dictionary Attack - Hybrid Attack

Brute Force Attack – tests alpha and numeric characters, starting at 1 character, then 2, 3 etc. Dictionary Attack – uses words from the dictionary Hybrid Attack – Alphanumeric attack, uses different combinations of letters and numbers

Man-in-the-middle attack: attacker passes information between users on a network, with each thinking their connection is secure - intercept passwords, files, s, etc. - only works on unsecure networks that do not require authentication

Social Engineering – gathering information through deception to commit fraud or gain computer system access Most common form of social engineering: Phishing

Phishing – fraudulent attempt to gain personal information or computer access Things they’re after: -username, password, credit card info Methods - , chat, instant messaging

Key loggers – covertly recording the keys struck on a keyboard Makes guessing passwords easier Types of key loggers: - software - hardware - acoustic - optical surveillance

Username/id – unique name/number that identifies an authorized user Each user has their own username/id Usually used in conjunction with passwords Weakness: often listed/posted where unauthorized users can see

Passwords – code made up of letters and characters that enables a user access (i.e. Good password practice: -Should be lengthy -Made up of different numbers, letters and characters - Should be changed frequently

The combination of a username/id and password is the most common user authentication technique Lockout after set number of unsuccessful login attempts, user notified Weakness: - human error, choose easy to remember, reuse password - vulnerable to password cracker

Security Questions – question(s) used to verify identity of user after correct login information accepted Personal questions, only user would know the answer(s) Like with username/id and password, lock out and notification to user after set number of unsuccessful login attempts

Weakness: - not commonly used - others know answers to some of the questions (information is often posted on social networking sites)

Encryption – data is scrambled by an algorithm Decryption – data reassembled using reverse algorithm - Provides 3 assurances - data not modified - decryption holders only ones who can view - data received at intended destination

Key encryption – weaves key made up of random characters into original data, creating cipher text 2 types of key encryption - Private - Public

Private Key Encryption – deciphering key of data only known by senders/receivers Very secure Weakness: - Key must be shared between sender/receiver in order to work

Public Key Encryption – data encrypted using 2 keys, private and public Public Key Infrastructure - uses public/private key pair that is obtained/shared through a trusted authority Provides for a digital certificate that can identify an individual

Authentication protocols – rules computers follow to verify a user’s credentials Authentication, authorization, accounting (AAA) – common form of access control

Remote Authentication Dial In User Service (RADIUS) – networking protocol with centralized AAA management, share authentication database - commonly used by ISPs to manage access to the Internet, wireless connections

Terminal Access Controller Access- Control System +(TACACS+) - provides centralized validation of users attempting to gain access to a router or network Similar to RADIUS

Differences: - RADIUS combines authentication and authorization, TACACS+ separates the two - RADIUS uses User Datagram Protocol (UDP) whereas TACACS+ uses Transmission Control Protocol (TCP)

Password Authentication Protocol (PAP) - Uses two step authentication process 1. Here are my credentials 2. Have/have not been authenticated - Simple, not secure

Challenge Handshake Authentication Protocol (CHAP) - uses three-way handshake - encrypts data 1. Here is a challenge 2. Here is the challenge, plus encrypted password 3. You have/have not been authenticated

Security Policy – outlines protocols to ensure user authentication integrity, combats security threats - make sure policy is practiced! Patches/Updates – keep systems current, fix problems that designers find before exploited Use multiple user authentication techniques to increase security

Department of Defense’s (DOD) Army Knowledge Online - username/password - password combination of letters, numbers, characters - 3 security questions - password changed every 150 days - requires ID card to change password

Pearson Custom Business Resources. COSC 316. Boston: Pearson Learning Solutions, Print. Dean, Tamara. Network+ Guide to Networks. 5th. Print.