1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Information systems security - Chapter 6: Access control

64 58 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 64
Dung lượng 1,06 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The content chapter 5 include: Access control models, authentication models, logging procedures, conducting security audits, redundancy planning, disaster recovery procedures, organizational policies.

Trang 1

 

Access Control

Trang 3

Access Control Fundamentals

v Jérôme Kerviel

v Rogue trader, lost €4.9 billion

v Largest fraud in banking

history at that time

v Worked in the compliance

department of a French bank

v Defeated security at his bank

by concealing transactions with

Trang 4

Access Control

v The process by which resources or services are granted

or denied on a computer system or network

v There are four standard access control models as well as specific practices used to enforce access control

Trang 5

Access Control Terminology

v Granting permission to take the action

v A computer user is granted access

v To only certain services or applications in order to perform their duties

v Custodian

v The person who reviews security settings

v Also called Administrator

Trang 6

Access Control Terminology

Trang 7

v Computer access control can be accomplished by one of three entities: hardware, software, or a policy

v Access control can take different forms depending on the resources that are being protected

v Other terminology is used to describe how computer systems impose access control:

v Object – resource to be protected

v Subject – user trying to access the object

v Operation – action being attempted

Trang 8

Access Control Terminology

Trang 9

Access Control

Trang 10

Access Control Models

v Mandatory Access Control

v Discretionary Access Control

v Role-Based Access Control

v Rule-Based Access Control

Trang 11

Mandatory Access Control (MAC) model

v Most restrictive model—used by the military

v Objects and subjects are assigned access levels

v Unclassified, Classified, Secret, Top Secret

v The end user cannot implement, modify, or transfer any controls

Trang 12

Discretionary Access Control (DAC)

Trang 13

DAC Has Two Significant Weaknesses

v It relies on the end-user subject to set the proper level of security

v A subject’s permissions will be “inherited” by any programs that the subject executes

Trang 14

User Account Control (UAC)

v Asks the user for

standard user accounts

v Standard users can

perform common tasks

Trang 15

Role Based Access Control (RBAC)

model

v Sometimes called Non-Discretionary Access Control

v Used in Windows corporate domains

v Considered a more “real world” approach than the other models

v Assigns permissions to particular roles in the organization, such as “Manager” and then assigns users to that role

v Objects are set to be a certain type, to which subjects with that particular role have access

Trang 16

Role Based Access Control (RBAC)

model

v Sometimes called Non-Discretionary Access Control

v Used in Windows corporate domains

v Considered a more “real world” approach than the other models

v Assigns permissions to particular roles in the organization, such as “Manager” and then assigns users to that role

v Objects are set to be a certain type, to which subjects with that particular role have access

Trang 17

Rule Based Access Control (RBAC) model

v Also called the

Trang 18

Access Control Models (continued)

Trang 19

Best Practices for Access Control

Trang 20

Best Practices for Access Control

v Least privilege

v Each user should be given only the minimal amount of privileges necessary to perform his or her job function

v Implicit deny

v If a condition is not explicitly met, access is denied

v For example, Web filters typically block unrated sites

Trang 21

Access Control Methods

v The methods to implement access control are divided into two broad categories

v Logical access control

v Physical access control

Trang 22

Logical Access Control Methods

v Logical access control includes

v Access control lists (ACLs)

v Group policies

v Account restrictions

v Passwords

Trang 23

Access Control List (ACL)

v A set of permissions

attached to an object

v Specifies which subjects

are allowed to access the

v Access control entry (ACE)

v Each entry in the ACL table in

the Microsoft Windows, Linux,

and Mac OS X operating

systems

Trang 24

Windows Access Control Entries (ACEs)

v In Windows, the ACE includes

v Security identifier (SID) for the user or group

v Access mask that specifies the access rights controlled by the ACE

v A flag that indicates the type of ACE

v A set of flags that determine whether objects can inherit permissions

Trang 25

Advanced Security Settings in Windows 7

Trang 26

Group Policy

v A Microsoft Windows feature that provides centralized management and configuration of computers and remote users

v Using the Microsoft directory services known as Active Directory (AD)

v Group Policy is used in corporate domains to restrict user actions that may pose a security risk

v Group Policy settings are stored in Group Policy Objects (GPOs)

Trang 27

Account Restrictions

v Time of day restrictions

v Limit when a user can log on to a system

v These restrictions can be set through a Group Policy

v Can also be set on individual systems

v Account expiration

v The process of setting a user’s account to expire

v Orphaned accounts are user accounts that remain active after an employee has left an organization

v Can be controlled using account expiration

Trang 28

Account Restrictions

v Time of day restrictions

v Limit when a user can log on to a system

v These restrictions can be set through a Group Policy

v Can also be set on individual systems

v Account expiration

v The process of setting a user’s account to expire

v Orphaned accounts are user accounts that remain active after an employee has left an organization

v Can be controlled using account expiration

Trang 29

Account Restrictions

Trang 31

v The most common logical access control

v Sometimes referred to as a logical token

v A secret combination of letters and numbers that only the user knows

v A password should never be written down

v Must also be of a sufficient length and complexity so that an attacker cannot easily guess it (password paradox)

Trang 32

Passwords Myths

Trang 33

Attacks on Passwords

v Brute force attack

v Simply trying to guess a password through combining a random combination of characters

v Passwords typically are stored in an encrypted form called

a “hash”

v Attackers try to steal the file of hashed passwords and then break the hashed passwords offline

Trang 34

How to Get the Hashes

v Easy way: Just use Cain

v Cracker tab, right-click, "Add to List"

Trang 35

Attacks on Passwords

v Dictionary attack

v Guess passwords from a dictionary

v Works if the password is a known common password

v Rainbow tables

v Make password attacks faster by creating a large pregenerated data set of hashes from nearly every possible password combination

v Works well against Windows passwords because Microsoft doesn't use the salting technique when computing hashes

Trang 36

Attacks on Passwords

Trang 37

Rainbow Tables

v Generating a rainbow table requires a significant amount

of time

v Rainbow table advantages

v Can be used repeatedly for attacks on other passwords

v Rainbow tables are much faster than dictionary attacks

v The amount of time needed on the attacking machine is greatly reduced

Trang 38

Rainbow Table Attack

Trang 39

Rainbow Tables

v Generating a rainbow table requires a significant amount

of time

v Rainbow table advantages

v Can be used repeatedly for attacks on other passwords

v Rainbow tables are much faster than dictionary attacks

v The amount of time needed on the attacking machine is greatly reduced

Trang 40

v Hashing algorithm should include a random sequence of bits

as input along with the user-created password

v These random bits are known as a salt

v Make brute force, dictionary, and rainbow table attacks much more difficult

Trang 41

No Salt!

v To make hashing stronger, add a random "Salt" to a password before hashing it

v Windows doesn't salt its hash!

v Two accounts with the same password hash to the same result, even in Windows 7!

v This makes it possible to speed up password cracking with precomputed Rainbow Tables

Trang 43

Linux Salts its Hashes

Trang 45

Domain Password Policy

v Setting password restrictions for a Windows domain can

be accomplished through the Windows Domain password policy

v There are six common domain password policy settings, called password setting objects

v Used to build a domain password policy

Trang 46

Domain Password Policy

Trang 47

Access Control Methods

v The methods to implement access control are divided into two broad categories

v Logical access control

v Physical access control

Trang 48

Physical Access Control

v Physical access control primarily protects computer equipment

v Designed to prevent unauthorized users from gaining physical access to equipment in order to use, steal, or vandalize it

v Physical access control includes computer security, door security, mantraps, video surveillance, and physical access logs

Trang 49

Physical Computer Security

v Physically securing network servers in an organization is essential

v Rack-mounted servers

v 4.45 centimeters (1.75 inches) tall

v Can be stacked with up to 50 other servers in a closely confined area

v KVM (Keyboard, Video, Mouse) Switch

v Needed to connect to the servers

v Can be password-protected

Trang 50

Physical Computer Security

Trang 52

requires only a key for unlocking the door from the outside

person, unless it has been set to remain unlocked

minimal

Trang 53

Deadbolt lock

v Extends a solid metal bar into the door frame

v Much more difficult to defeat than preset locks

v Requires that the key be used to both open and lock the door

Trang 54

Lock Best Practices

v Change locks immediately upon loss or theft of keys

v Inspect all locks on a regular basis

v Issue keys only to authorized persons

v Keep records of who uses and turns in keys

v Keep track of keys issued, with their number and identification

v Master keys should not have any marks identifying them

as masters

Trang 55

Lock Best Practices

v Secure unused keys in a locked safe

v Set up a procedure to monitor the use of all locks and keys and update the procedure as necessary

v When making duplicates of master keys, mark them “Do Not Duplicate,” and wipe out the manufacturer’s serial numbers to keep duplicates from being ordered

Trang 56

Cipher Lock

v Combination locks that use buttons that must be pushed in the proper sequence

to open the door

v Can be programmed to allow only the code of certain individuals to be valid on specific dates and times

v Cipher locks also keep a record of when the door was opened and by which code

v Cipher locks are typically connected to

a networked computer system

v Can be monitored and controlled from one central location

Trang 57

Cipher Lock Disadvantages

v Basic models can cost several hundred dollars while advanced models can be even more expensive

v Users must be careful to conceal which buttons they push

to avoid someone seeing or photographing the combination

Trang 58

Tailgate Sensor

v Uses infrared beams that are aimed across a doorway

v Can detect if a second person walks through the beam array immediately behind (“tailgates”) the first person

v Without presenting credentials

Trang 59

Physical Tokens

v Objects to identify users

v ID Badge

v The most common types of physical tokens

v ID badges originally were visually screened by security guards

v Today, ID badges can be fitted with tiny radio frequency identification (RFID) tags

the door with the badge in her pocket

Trang 60

RFID tag

Trang 61

v Before entering a secure area, a person must enter the mantrap

v A small room like an elevator

v If their ID is not valid, they are trapped there until the police arrive

v Mantraps are used at high-security areas where only authorized persons are allowed to enter

v Such as sensitive data processing areas, cash handling areas, critical research labs, security control rooms, and automated airline passenger entry portals

Trang 62

Mantrap

Trang 63

Video Surveillance

v Closed circuit television (CCTV)

v Using video cameras to transmit a signal to a specific and limited set of receivers

v Some CCTV cameras are fixed in a single position pointed

at a door or a hallway

v Other cameras resemble a small dome and allow the security technician to move the camera 360 degrees for a full panoramic view

Trang 64

Physical Access Log

v A record or list of individuals who entered a secure area, the time that they entered, and the time they left the area

v Can also identify if unauthorized personnel have accessed

a secure area

v Physical access logs originally were paper documents

v Today, door access systems and physical tokens can generate electronic log documents

Ngày đăng: 30/01/2020, 11:58