 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Access Control Chapter 3 Part 3 Pages 209 to 227.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Key Exchange – Diffie-Hellman – Symmetric crypto (KDC idea, Needham-Shroeder, Kerberos) – Asymmetric crypto – certificates Stolen keys recovery Group keys.
Access Control Methodologies
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
System Security Scanning and Discovery Chapter 14.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci555: Advanced Operating Systems Lecture.
System and Network Security Practices COEN 351 E-Commerce Security.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authorization.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Data Security in Local Networks using Distributed Firewalls
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Authorization and Policy. Is principal P permitted to perform action A on object O? – Authorization system will provide yes/no answer Authorization.
Understanding Active Directory
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Virtual Private Network
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Authentication and Identity Management. Ideally – Who you are Practically – Something you know (e.g., password) – Something you have (e.g., badge) – Something.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Cloud Computing Cloud Security– an overview Keke Chen.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Integrating and Troubleshooting Citrix Access Gateway.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Chapter 2 Securing Network Server and User Workstations.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Database Security David Nguyen. Dangers of Internet  Web based applications open up new threats to a corporation security  Protection of information.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE September Integrating Policy with Applications.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Computer Security By Duncan Hall.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
4P13 Week 5 Talking Points 1. Security Provided by BSD a self-protecting Trusted Computing Base (TCB) spanning kernel and userspace; kernel isolation.
IS3220 Information Technology Infrastructure Security
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Configuring Windows Firewall with Advanced Security
Chapter 27: System Security
Data Security in Local Networks using Distributed Firewalls
PLANNING A SECURE BASELINE INSTALLATION
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

 Single sign-on o Centralized and federated passport o Federated Liberty Alliance and Shibboleth  Authorization o Who can access which resource o ACM represented as ACL or capabilities o Discretionary, mandatory and originator- controlled access control  Bell-Lapadula model  Role-based model  Biba integrity model

 Today’s security tools work with no coordinated policy o Firewalls and Virtual Private Networks o Authentication and Public Key Infrastructure o Intrusion Detection and limited response  We need better coordination o Not just who can access what, but policy says what kind of encryption to use, when to notify IDS  Tools should implement coordinated policies o Policies originate from multiple sources o Policies should adapt to dynamic threat conditions o Policies should adapt to dynamic policy changes

SECURITY AUDIT RECORDS INTRUSION DETECTION UNDER ATTACK GAA API EACL... Authentication Databases Web Servers Firewalls IPSec …

 Focus integration efforts on authorization and the management of policies used in the authorization decision o Applications shouldn’t care about authentication or identity  Separate policy from mechanism o Authorization may be easier to integrate with applications o Hide the calls to individual security services  E.g. key management, authentication, encryption, audit

 Positive and negative access right  Conditions on each rule - evaluated in a given order  Sample ACL ( ) o Tom cannot login to the host o Logins from the specified IP address range are permitted, using either X509 or Kerberos for authentication if previous login attempts <= 3. If the request fails, the number of the failed logins should be updated. The connection duration < 8 h. o Anyone, without authentication, can check the status of the host if his IP is in specified range o Host shut downs are permitted, using Kerberos for authentication. On success, the user ID must be logged. On failure, the sysadmin is sent an

 Pre-conditions o What must be true in order to grant request  Request-result o These conditions must be activated regardless of whether the access is granted or not  Mid-conditions o What must be true during execution of requested operation  Post-conditions o What must be true on completion of requested operation.

GAA-API a.isi.edu, connect, Tom gaa_check_authorization() T/F/U System State EACL gaa_get_object_policy_info() gaa_post_execution_actions() T/F/U gaa_execution_control() T/F/U

 Discretionary policies associated with objects o Read from existing applications or EACLs  Local policies merged with object policies o Broadening or narrowing allowed access  Policies imported from policy/state issuers o ID system issues state credentials, These credentials may embed policy as well.  Policies embedded in credentials o These policies attach to user/process credentials and apply to access by only specific processes  Policies evaluated remotely o Credential issuers evaluate policies to decide which credentials to issue.

 Dynamic policy evaluation enables response to attacks: o Lockdown system if attack is detected o Establish quarantines by changing policy to establish isolated virtual networks dynamically o Allow increased access between coalition members as new coalitions are formed or membership changes to respond to unexpected events

 You have an isolated local area network with mixed access to web services (some clients authenticated, some not).

 You need to allow incoming authenticated SSH or IPSec connections.

 You have an isolated local area network with mixed access to web services (some clients authenticated, some not).  You need to allow incoming authenticated SSH or IPSec connections.  When such connections are active, you want to lock down your servers and require stronger authentication and confidentiality protection on all accesses within the network.

 Some techniques and tools mentioned in this class could be: o Illegal to use o Dangerous for others – they can crash machines and clog the network o Dangerous for you – downloading the attack code you provide attacker with info about your machine  Don’t use any such tools in real networks o Especially not on USC network o You can only use them in a controlled environment, e.g. DETER testbed Dangerous

 Why do people break into computers?  What type of people usually breaks into computers?  I thought that this was a security course. Why are we learning about attacks?

 Reconnaissance  Scanning  Gaining access at OS, application or network level  Maintaining access  Covering tracks

 Get a lot of information about intended target: o Learn how its network is organized o Learn any specifics about OS and applications running

 Social engineering o Instruct the employees not to divulge sensitive information on the phone  Physical break-in o Insist on using badges for access, everyone must have a badge, lock sensitive equipment o How about wireless access?  Dumpster diving o Shred important documents

 Search organization’s web site o Make sure not to post anything sensitive  Search information on various mailing list archives and interest groups o Instruct your employees what info should not be posted o Find out what is posted about you  Search the Web with a search engine to find all documents mentioning this company o Find out what is posted about you

 When an organization acquires domain name it provides information to a registrar  Public registrar files contain: o Registered domain names o Domain name servers o Contact people names, phone numbers, addresses o  ARIN database o Range of IP addresses o

 What does DNS do?  How does DNS work?  Types of information an attacker can gather: o Range of addresses used o Address of a mail server o Address of a web server o OS information o Comments