Access Control Methodologies

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Operating System Security
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Chapter 2.  CIA Model  Host Security VS Network Security  Least Privileges  Layered Security  Access Controls Prepared by Mohammed Saher2.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Security+ Guide to Network Security Fundamentals, Third Edition
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Access Control Dr.Talal Alkharobi.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
User Domain Policies.
2  A system can protect itself in two ways: It can limit who can access the system. This requires the system to implement a two-step process of identification.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Chapter 10: Authentication Guide to Computer Network Security.
FORESEC Academy FORESEC Academy Security Essentials (II)
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Designing Active Directory for Security
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
G53SEC 1 Access Control principals, objects and their operations.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
Access Control / Authenticity Michael Sheppard 11/10/10.
Trusted Operating Systems
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
SEC835 Identity and Access Management Overview. Tasks of IAM Specify the rules of electronic identity Maintain identity Validate identity Define access.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Chapter 14: Controlling and Monitoring Access. Comparing Access Control Models Comparing permissions, rights, and privileges Understanding authorization.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
ISSAP Session 1 29 August 2011.
Secure Connected Infrastructure
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Chapter One: Mastering the Basics of Security
Radius, LDAP, Radius used in Authenticating Users
CompTIA Security+ Study Guide (SY0-401)
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Access Control.
Access Control What’s New?
Presentation transcript:

Access Control Methodologies Chapter 2

Basics of Access Control Access control is a collection of methods and components Supports confidentiality (protects information from unauthorized disclosure) Supports integrity (protects information from unauthorized modification) Goal: to allow only authorized subjects to access objects that they are permitted to access

Access Control Basics (continued) Subject The entity that requests access to a resource Object The resource a subject attempts to access Least privilege philosophy A subject is granted permissions needed to accomplish required tasks and nothing more

Controls Mechanisms put into place to allow or disallow object access Any potential barrier to unauthorized access Controls organized into different categories Common categories Administrative (enforce security rules through policies) Logical/Technical (implement object access restrictions) Physical (limit physical access to hardware)

Access Control Techniques Choose techniques that fit the organization’s needs Considerations include Level of security required User and environmental impact of security measures Techniques differ in The way objects and subjects are identified How decisions are made to approve or deny access

Access Control Designs Access control designs define rules for users accessing files or devices Three common access control designs Mandatory access control Discretionary access control Non-discretionary access control

Mandatory Access Control Assigns a security label to each subject and object Matches label of subject to label of object to determine when access should be granted A common implementation is rule-based access control Often requires a subject to have a need to know in addition to proper security clearance Need to know indicates that a subject requires access to object to complete a particular task

Mandatory Access Control (continued) Common military data classifications Unclassified, Sensitive but Unclassified, Confidential, Secret, Top Secret Common commercial data classifications Public, Sensitive, Private, Confidential

Discretionary Access Control Uses identity of subject to decide when to grant an access request All access to an object is defined by the object owner Most common design in commercial operating systems Generally less secure than mandatory control Generally easier to implement and more flexible Includes Identity-based access control Access control lists (ACLs)

Non-discretionary Access Control Uses a subject’s role or a task assigned to subject to grant or deny object access Also called role-based or task-based access control Works well in environments with high turnover of subjects since access is not tied directly to subject Lattice-based control is a variation of non-discretionary control Relationship between subject and object has a set of access boundaries that define rules and conditions for access

Access Control Administration Can be implemented as centralized, decentralized, or hybrid Centralized access control administration All requests go through a central authority Administration is relatively simple Single point of failure, sometimes performance bottlenecks Common packages include Remote Authentication Dial-In User Service (RADIUS), Challenge Handshake Authentication Protocol (CHAP), Terminal Access Controller Access Control System (TACACS)

Access Control Administration (continued) Decentralized access control administration Object access is controlled locally rather than centrally More difficult administration Objects may need to be secured at multiple locations More stable Not a single point of failure Usually implemented using security domains

Accountability System auditing used by administrators to monitor Who is using the system What users are doing Logs can trace events back to originating users Process of auditing can have a negative effect on system performance Must limit data collected in logs Clipping levels set thresholds for when to start collecting data

Access Control Models Provide conceptual view of security policies Map goals and directives to specific system events Provide a formal definition and specification of required security controls Many different models and combinations of models are used

State Machine Model A collection of defined states and transitions Modifications change objects from one state to the next A state represents the characteristics of an object at a point in time Transitions represent the modifications that can be made to objects to change from one state to another

State Machine Model (continued)

State Machine Model (continued) Bell-LaPadula model Works well in organizations that focus on confidentiality Biba model Focuses on integrity controls Clark-Wilson Model Not a state machine model Restricts access to a small number of tightly controlled access programs Noninterference Model Often an addition to other models Ensures that changes at one security level do not bleed over into other levels

Identification and Authentication Methods Two-factor authentication uses two phases Identification Authentication Security practices often require input from multiple categories of authentication techniques Most complex authentication mechanism is biometrics (detection and classification of a subject’s physical attributes)

Identification and Authentication Methods (continued)

Single Sign-On Used to avoid multiple logins Once a subject is positively identified, authentication information can be used within a trusted group Great for users since they can sign on once and use multiple resources Requires additional work for administrators Several good SSO systems in use, Kerberos is one example

Kerberos Uses symmetric key cryptography for messages Provides end-to-end security Intermediate machines between the source and target cannot read contents of messages Used in distributed environments but implemented with a central server Includes a data repository and an authentication process Weaknesses include Single point of failure, performance bottleneck Session key lives on client machines for a small amount of time, can be stolen

File and Data Ownership Different layers of responsibility for ensuring security of organization’s information Data owner Bears ultimate responsibility, sets classification levels Data custodian Enforces security policies, often a member of IT department Data user Accesses data on a day-to-day basis, responsible for following the organization’s security policies

Related Methods of Attacks Brute force attack Try all possible combinations of characters to satisfy Type 1 authentication (password guessing) Dictionary attack Subset of brute force Instead of all possible combinations, uses a list of common passwords Spoofing attack Create fake login program, prompt for User ID, password Return login failure message, store captured information

Summary Use access control to ensure that only authorized users can view/modify information Access control designs define rules for accessing objects Mandatory, discretionary, non-discretionary Access control administration defines the mechanisms for access control implementation Centralized, decentralized, hybrid Administrators use system logs to monitor access

Summary (continued) Access control models Provide a conceptual view of security policies One common example is the state machine model Identification and authentication methods Used to identify and validate a user Include passwords, smart cards, and biometrics Single sign-on systems allow trusted groups to share authorizations (e.g., Kerberos) Responsibility for information access is shared Data owners, custodians, users Attack types related to access controls include Brute force attacks, dictionary attacks, login spoofing