Access Control Systems A means of ensuring a system’s C.I.A given the threats, vulnerabilities, & risks its infrastructure.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Lecture 6 User Authentication (cont)
CISSP Luncheon Series: Access Control Systems & Methodology
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Access Control Methodologies
MIS PROTECTING INFORMATION RESOURCES Biometrics Identity theft
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
1 An Overview of Computer Security computer security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Controls for Information Security
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
Chapter 19 Security.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
ACCESS CONTROLS SZABIST – Spring Access Controls This chapter presents the following:  Identification methods and technologies  Authentication.
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
1 Guide to Network Defense and Countermeasures Chapter 2.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Information Systems Security
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Information Systems Security Operations Security Domain #9.
Operating system Security By Murtaza K. Madraswala.
Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers ( ) and Secrets and Lies ( )
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Access Control Systems A means of ensuring a system’s C.I.A given the threats, vulnerabilities, & risks its infrastructure.
Component 8/Unit 6aHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 6a System Security Procedures.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Chap1: Is there a Security Problem in Computing?.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Ingredients of Security
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Authentication What you know? What you have? What you are?
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Access Control / Authenticity Michael Sheppard 11/10/10.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
CSCE 201 Identification and Authentication Fall 2015.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Chapter 13: Managing Identity and Authentication.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1 Access Control Systems & Methodology. Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Working at a Small-to-Medium Business or ISP – Chapter 8
Secure Software Confidentiality Integrity Data Security Authentication
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security in Networking
Intrusion Detection system
Welcome to all Participants
Cybersecurity and Cyberhygiene
Operating System Concepts
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Access Control Systems A means of ensuring a system’s C.I.A given the threats, vulnerabilities, & risks its infrastructure

Rationale  Confidentiality Info not disclosed to unauthorized persons or processes  Integrity Internal consistency External consistency  Availability Reliability Utility

Systems  Complex  Interact with other systems  Have emergent properties that their designers did not intend  Have bugs

Systems & Security  Usual coping mechanism is to ignore the problem…WRONG  Security is system within larger system  Security theory vs security practice Real world systems do not lend themselves to theoretical solutions  Must look at entire system & how security affects

The Landscape  Secure from whom?  Secure against what?  Never black & white  Context matters more than technology  Secure is meaningless out of context

Completely Secure Servers  Disconnect from Network  Power Down  Wipe & Degauss Memory & Harddrive  Pulverize it to dust  Threat Modeling  Risk management

Concepts in planning  Threat Potential to cause harm  Vulnerability Weakness or lack of safeguard that can be exploited by threat  Risk Potential for loss or harm Probability that threat will materialize

Threats  Attacks are exceptions  Digital Threats mirror Physical  Will become more common, more widespread, harder to catch due to: Automation Action at a Distance  Every two points are adjacent Technical Propagation

Threats  All types of attackers  All present some type of threat  Impossible to anticipate all attacks or all types of attackers or all avenues of attack  Point is not to prevent all but to “think about and analyze threats with greater depth and to take reasonable steps to prevent…”

Attacks  Criminal Fraud-prolific on the Internet Destructive, Intellectual Property Identity Theft, Brand Theft  Privacy: less and less available people do not own their own data Surveillance, Databases, Traffic Analysis Echelon, Carnivore  Publicity & Denial of Service  Legal

Controls  Implemented to mitigate risk & reduce loss  Categories of controls Preventative Detective Corrective

Control Implementation types Administrative: polices, procedures, security awareness training, background checks, vacation history review Logical / Technical – encryption, smart cards, ACL Physical – guards, locks, protection of transmission media, backup

Models for Controlling Access  Control: Limiting access by a subject to an object  Categories of controls Mandatory Access Control (MAC)  Clearance, sensitivity of object, need to know  Ex: Rule-based Discretionary Access Control (DAC)  Limited ability for Subject to allow access  ACL, access control triple: user, program, object or file Non-Discretionary Access Control  Central authority determines access

SELinux MAC  Mandatory Access Control in kernel  Implemented via: type enforcement (domains) Role based access control  No user discretionary access control  Each process, file, user, etc has a domain & operations are limited within it  Root user can be divided into roles also

Control Combinations  Preventative / Administrative  Preventative / Technical  Preventative / Physical  Detective / Administrative  Detective / Technical  Detective / Physical

Access Control Attacks  DoS, DDos Buffer Overflow, SYN Attack, Smurf  Back door  Spoofing  Man-in-the-Middle  Replay  TCP Hijacking  Software Exploitation: non up to date software  Trojan Horses

Social Engineering  Ex: s or phone calls from “upper mgt or administrators” requesting passwords  Dumpster Diving  Password guessing: L0phat  Brute force  Dictionary attack

System Scanning  Collection of info about a system What ports, what services running, what system software, what versions being used  Steps: 1.Network Reconnaissance 2.Gaining System Access 3.Removing Evidence of attack  Prevention Watch for scans &/or access of common unused ports

Penetration Testing  “Ethical hacking”  Network-based IDS  Host-based IDS  Tests Full knowledge, Partial knowledge, Zero knowledge Open box – Closed box

Penetration Testing Steps 1.GET APPROVAL from upper mgt 2.Discovery 3.Enumeration of tests 4.Vulnerability mapping 5.Exploitation 6.Reporting

Identification & Authentication  ID: subject professing who they are  Auth: verification of ID  Three types of authentication Something you know Something you have Something you are Two-factor is way the best

Passwords  Static  Dynamic  Passphrase  Dictionary words  Alpha numeric special character  Models for choosing  Rotation schedules for passwords

Biometrics  Fingerprint, palm, retina, iris, face, voice, handwritting, RFID, etc  Enrollment time (2 min)  Throughput rate (10 subjects/min)  Corpus: Collection of biometric data

Biometrics  False Rejection Rate (FRR)  False Acceptance Rate (FAR)  Crossover Error Rate (CER) FAR FRR CER

Single Sign On (SSO)  One id / password per session regardless of the # of systems used  Advantages Ease of use, Stronger passwords/biodata, easier administration, lower use of resources  Disadvantages If access control is broken is a MUCH bigger problem

SSO Example: Kerberos 1.User enters id/pass 2.Client requests service 3.Ticket is encrypted with servers public key and sent to client 4.Client sends ticket to server & requests service 5.Server responds Problems: replay, compromised tickets

Access Control  Centralized Remote Authentication & Dial-In (Wireless) User Service (RADIUS) Call back  De-centralized Relational Databases (can be both)  Relational concepts  Security issues

Intrusion Detection Systems  Network Based Monitors Packets & headers SNORT Will not detect attacks same host attacks  Host based Monitors logs and system activity  Types Signature based (slow attacks problem) Statistical Anomaly Based

Other issues  Costs  Privacy  Accountability  Compensation for violations Backups RAID (Redundant Array of Independent Disks) Fault tollerance Business Continuity Planning Insurance

References  Building Secure Linux Servers ( )  Secrets and Lies ( )