.  Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Internet Protocol Security (IP Sec)
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Security+ Guide to Network Security Fundamentals, Third Edition
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
Remote Access Network Management Kelly Given Allison Traina.
Chapter 12 Network Security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
802.1x EAP Authentication Protocols
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Remote Networking Architectures
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Chapter 10: Authentication Guide to Computer Network Security.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Mobile and Wireless Communication Security By Jason Gratto.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
WIRELESS LAN SECURITY Using
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Cisco’s Secure Access Control Server (ACS)
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Authentication Protocols Natalie DeKoker, Lindsay Haley, Jordan Lunda, Matty Ott.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Understand User Authentication LESSON 2.1A Security Fundamentals.
Module 9: Configuring Network Access
Microsoft Windows NT 4.0 Authentication Protocols
Remote Access Lecture 2.
Configuring and Troubleshooting Routing and Remote Access
Radius, LDAP, Radius used in Authenticating Users
Presentation transcript:

 Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual Private Network (VPN)

 Slow guessing and botnets conceal the attacks  Countermeasures  Strong password policy, restricting access to server by source IP, two-factor authentication

 Authentication can be defined in two contexts  The first is viewing authentication as it relates to access control  The second is to look at it as one of the three key elements of security:  Authentication  Authorization  Accounting

 Access control is the process by which resources or services are granted or denied  Identification  The presentation of credentials or identification  Authentication  The verification of the credentials to ensure that they are genuine and not fabricated  Authorization  Granting permission for admittance  Access is the right to use specific resources

 Short term: AAA  Authentication in AAA provides a way of identifying a user  Typically with a password  Authorization determines whether the user has the authority to carry out certain tasks  The process of enforcing policies  Accounting measures the resources a user “consumes” during each network session

 To find evidence of problems  For billing  For planning  AAA servers  Servers dedicated to performing AAA functions  Can provide significant advantages in a network

 Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual Private Network (VPN)

 Credentials are something you have, something you are, or something you know  Types of authentication credentials  Passwords  One-time passwords  Standard biometrics  Behavioral biometrics  Cognitive biometrics

 Standard passwords are typically static in nature  One-time passwords (OTP)  Dynamic passwords that change frequently  Systems using OTPs generate a unique password on demand that is not reusable  The most common type is a time-synchronized OTP  Used in conjunction with a token  The token and a corresponding authentication server share the same algorithm  Each algorithm is different for each user’s token

 Authentication server displays a challenge (a random number) to the user  User then enters the challenge number into the token  Which then executes a special algorithm to generate a password  Because the authentication server has this same algorithm, it can also generate the password and compare it against that entered by the user

 Uses a person’s unique characteristics for authentication (what he is)  Examples: fingerprints, faces, hands, irises, retinas  Types of fingerprint scanners  Static fingerprint scanner  Dynamic fingerprint scanner (more secure)  Disadvantages  Costs  Readers are not always foolproof  How can you change your password if it's your fingerprint?

 Authenticates by normal actions that the user performs  Keystroke dynamics  Attempt to recognize a user’s unique typing rhythm  Keystroke dynamics uses two unique typing variables  Dwell time  Flight time

 Voice recognition  Uses unique characteristics of a person’s voice  Phonetic cadence  Speaking two words together in a way that one word “bleeds” into the next word  Becomes part of each user’s speech pattern  Computer footprint  When and from where a user normally accesses a system

 A simple form of two-factor authentication  Required by the US now

 Related to the perception, thought process, and understanding of the user  Easier for the user to remember because it is based on the user’s life experiences  One example of cognitive biometrics is based on a life experience that the user remembers  Another example of cognitive biometrics requires the user to identify specific faces

 Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual Private Network (VPN)

 One-factor authentication  Using only one authentication credential, such as a password  Two-factor authentication  Enhances security, particularly if different types of authentication methods are used (password and token)  Three-factor authentication  Requires that a user present three different types of authentication credentials

 Identity management  Using a single authenticated ID to be shared across multiple networks  Federated identity management (FIM)  When those networks are owned by different organizations  One application of FIM is called single sign-on (SSO)  Using one authentication to access multiple accounts or applications

 Originally introduced in 1999 as.NET Passport  When the user wants to log into a Web site that supports Windows Live ID  The user will first be redirected to the nearest authentication server  Once authenticated, the user is given an encrypted time- limited “global” cookie  Never became widely used

 New Windows feature  Users control digital identities with digital ID cards  Types of cards  Managed cards  Personal cards

 A decentralized open source FIM  Does not require specific software to be installed on the desktop  An OpenID identity is only a URL backed up by a username and password  OpenID provides a means to prove that the user owns that specific URL  Not very secure--dependent on DNS

 Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual Private Network (VPN)

 Authentication can be provided on a network by a dedicated AAA or authentication server  The most common type of authentication and AAA servers are  RADIUS  Kerberos  TACACS+  Generic servers built on the Lightweight Directory Access Protocol (LDAP)

 RADIUS: Remote Authentication Dial in User Service  Developed in 1992  The industry standard with widespread support  Suitable for what are called “high-volume service control applications”  With the development of IEEE 802.1x port security for both wired and wireless LANs  RADIUS has recently seen even greater usage

 A RADIUS client is typically a device such as a dial-up server or wireless access point (AP)  Responsible for sending user credentials and connection parameters in the form of a RADIUS message to a RADIUS server  The RADIUS server authenticates and authorizes the RADIUS client request  Sends back a RADIUS message response  RADIUS clients also send RADIUS accounting messages to RADIUS servers

 An authentication system developed by the Massachusetts Institute of Technology (MIT)  Used to verify the identity of networked users  Kerberos authentication server issues a ticket to the user  The user presents this ticket to the network for a service  The service then examines the ticket to verify the identity of the user

 Terminal Access Control Access Control System (TACACS+)  Developed by Cisco to replace RADIUS  More secure and reliable than RADIUS  The centralized server can either be a TACACS+ database  Or a database such as a Linux or UNIX password file with TACACS protocol support

 Directory service  A database stored on the network itself that contains information about users and network devices  Can be used with RADIUS  X.500  A standard for directory services  Created by ISO  White-pages service  Capability to look up information by name  Yellow-pages service  Browse and search for information by category

 The information is held in a directory information base (DIB)  Entries in the DIB are arranged in a tree structure called the directory information tree (DIT)  Directory Access Protocol (DAP)  Protocol for a client application to access an X.500 directory  DAP is too large to run on a personal computer

 Lightweight Directory Access Protocol (LDAP)  Sometimes called X.500 Lite  A simpler subset of DAP  Primary differences  LDAP was designed to run over TCP/IP  LDAP has simpler functions  LDAP encodes its protocol elements in a less complex way than X.500  LDAP is an open protocol

 Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual Private Network (VPN)

 In IEEE 802.1x, EAP is the "envelope" that carries data used for authentication  Three EAP protocol categories:  Authentication legacy protocols  EAP weak protocols  EAP strong protocols

 No longer extensively used for authentication  Password Authentication Protocol (PAP)  Sends passwords in the clear  Challenge-Handshake Authentication Protocol (CHAP)  Safer than PAP, but vulnerable  Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP)

 Still used but have security vulnerabilities  Extended Authentication Protocol–MD5 (EAP-MD5)  Vulnerable to offline dictionary attacks  Lightweight EAP (LEAP)  Also vulnerable to offline dictionary attacks  Can be cracked faster than WEP

 EAP with Transport Layer Security (EAP-TLS)  Uses certificates for both client and server  Used in large Windows networks  EAP with Tunneled TLS (EAP-TTLS) and Protected EAP (PEAP)  No client-side certificate  Easier to implement than EAP-TLS

 Define authentication  Authentication credentials  Authentication models  Authentication servers  Extended authentication protocols  Virtual Private Network (VPN)

 Important to maintain strong security for remote communications  Transmissions are routed through networks or devices that the organization does not manage and secure  Managing remote authentication and security usually includes:  Using remote access services  Installing a virtual private network  Maintaining a consistent remote access policy

 Any combination of hardware and software that enables access to remote users to a local internal network  Provides remote users with the same access and functionality as local users

 One of the most common types of RAS  Uses an unsecured public network, such as the Internet, as if it were a secure private network  Encrypts all data that is transmitted between the remote device and the network  Common types of VPNs  Remote-access VPN or virtual private dial-up network (VPDN)  Site-to-site VPN

 VPN transmissions are achieved through communicating with endpoints  Endpoint  End of the tunnel between VPN devices  VPN concentrator  Aggregates hundreds or thousands of multiple connections  Depending upon the type of endpoint that is being used, client software may be required on the devices that are connecting to the VPN

 VPNs can be software-based or hardware-based  Software-based VPNs offer the most flexibility in how network traffic is managed  Hardware-based VPNs generally tunnel all traffic they handle regardless of the protocol  Generally, software based VPNs do not have as good performance or security as a hardware-based VPN

 Cost savings (no long-distance phone call)  Scalability (easy to add more users)  Full protection (all traffic is encrypted)  Speed (faster than direct dial-up)  Transparency (invisible to the user)  Authentication (only authorized users can connect)  Industry standards

 Management  Availability and performance  Interoperability  Additional protocols  Performance impact  Expense

 Establishing strong remote access policies is important  Some recommendations for remote access policies:  Remote access policies should be consistent for all users  Remote access should be the responsibility of the IT department  Form a working group and create a standard that all departments will agree to