The content chapter 5 include: Access control models, authentication models, logging procedures, conducting security audits, redundancy planning, disaster recovery procedures, organizational policies.
Trang 1
Access Control
Trang 3Access Control Fundamentals
v Jérôme Kerviel
v Rogue trader, lost €4.9 billion
v Largest fraud in banking
history at that time
v Worked in the compliance
department of a French bank
v Defeated security at his bank
by concealing transactions with
Trang 4Access Control
v The process by which resources or services are granted
or denied on a computer system or network
v There are four standard access control models as well as specific practices used to enforce access control
Trang 5Access Control Terminology
v Granting permission to take the action
v A computer user is granted access
v To only certain services or applications in order to perform their duties
v Custodian
v The person who reviews security settings
v Also called Administrator
Trang 6Access Control Terminology
Trang 7v Computer access control can be accomplished by one of three entities: hardware, software, or a policy
v Access control can take different forms depending on the resources that are being protected
v Other terminology is used to describe how computer systems impose access control:
v Object – resource to be protected
v Subject – user trying to access the object
v Operation – action being attempted
Trang 8Access Control Terminology
Trang 9Access Control
Trang 10Access Control Models
v Mandatory Access Control
v Discretionary Access Control
v Role-Based Access Control
v Rule-Based Access Control
Trang 11Mandatory Access Control (MAC) model
v Most restrictive model—used by the military
v Objects and subjects are assigned access levels
v Unclassified, Classified, Secret, Top Secret
v The end user cannot implement, modify, or transfer any controls
Trang 12Discretionary Access Control (DAC)
Trang 13DAC Has Two Significant Weaknesses
v It relies on the end-user subject to set the proper level of security
v A subject’s permissions will be “inherited” by any programs that the subject executes
Trang 14User Account Control (UAC)
v Asks the user for
standard user accounts
v Standard users can
perform common tasks
Trang 15Role Based Access Control (RBAC)
model
v Sometimes called Non-Discretionary Access Control
v Used in Windows corporate domains
v Considered a more “real world” approach than the other models
v Assigns permissions to particular roles in the organization, such as “Manager” and then assigns users to that role
v Objects are set to be a certain type, to which subjects with that particular role have access
Trang 16Role Based Access Control (RBAC)
model
v Sometimes called Non-Discretionary Access Control
v Used in Windows corporate domains
v Considered a more “real world” approach than the other models
v Assigns permissions to particular roles in the organization, such as “Manager” and then assigns users to that role
v Objects are set to be a certain type, to which subjects with that particular role have access
Trang 17Rule Based Access Control (RBAC) model
v Also called the
Trang 18Access Control Models (continued)
Trang 19Best Practices for Access Control
Trang 20Best Practices for Access Control
v Least privilege
v Each user should be given only the minimal amount of privileges necessary to perform his or her job function
v Implicit deny
v If a condition is not explicitly met, access is denied
v For example, Web filters typically block unrated sites
Trang 21Access Control Methods
v The methods to implement access control are divided into two broad categories
v Logical access control
v Physical access control
Trang 22Logical Access Control Methods
v Logical access control includes
v Access control lists (ACLs)
v Group policies
v Account restrictions
v Passwords
Trang 23Access Control List (ACL)
v A set of permissions
attached to an object
v Specifies which subjects
are allowed to access the
v Access control entry (ACE)
v Each entry in the ACL table in
the Microsoft Windows, Linux,
and Mac OS X operating
systems
Trang 24Windows Access Control Entries (ACEs)
v In Windows, the ACE includes
v Security identifier (SID) for the user or group
v Access mask that specifies the access rights controlled by the ACE
v A flag that indicates the type of ACE
v A set of flags that determine whether objects can inherit permissions
Trang 25Advanced Security Settings in Windows 7
Trang 26Group Policy
v A Microsoft Windows feature that provides centralized management and configuration of computers and remote users
v Using the Microsoft directory services known as Active Directory (AD)
v Group Policy is used in corporate domains to restrict user actions that may pose a security risk
v Group Policy settings are stored in Group Policy Objects (GPOs)
Trang 27Account Restrictions
v Time of day restrictions
v Limit when a user can log on to a system
v These restrictions can be set through a Group Policy
v Can also be set on individual systems
v Account expiration
v The process of setting a user’s account to expire
v Orphaned accounts are user accounts that remain active after an employee has left an organization
v Can be controlled using account expiration
Trang 28Account Restrictions
v Time of day restrictions
v Limit when a user can log on to a system
v These restrictions can be set through a Group Policy
v Can also be set on individual systems
v Account expiration
v The process of setting a user’s account to expire
v Orphaned accounts are user accounts that remain active after an employee has left an organization
v Can be controlled using account expiration
Trang 29Account Restrictions
Trang 31v The most common logical access control
v Sometimes referred to as a logical token
v A secret combination of letters and numbers that only the user knows
v A password should never be written down
v Must also be of a sufficient length and complexity so that an attacker cannot easily guess it (password paradox)
Trang 32Passwords Myths
Trang 33Attacks on Passwords
v Brute force attack
v Simply trying to guess a password through combining a random combination of characters
v Passwords typically are stored in an encrypted form called
a “hash”
v Attackers try to steal the file of hashed passwords and then break the hashed passwords offline
Trang 34How to Get the Hashes
v Easy way: Just use Cain
v Cracker tab, right-click, "Add to List"
Trang 35Attacks on Passwords
v Dictionary attack
v Guess passwords from a dictionary
v Works if the password is a known common password
v Rainbow tables
v Make password attacks faster by creating a large pregenerated data set of hashes from nearly every possible password combination
v Works well against Windows passwords because Microsoft doesn't use the salting technique when computing hashes
Trang 36Attacks on Passwords
Trang 37Rainbow Tables
v Generating a rainbow table requires a significant amount
of time
v Rainbow table advantages
v Can be used repeatedly for attacks on other passwords
v Rainbow tables are much faster than dictionary attacks
v The amount of time needed on the attacking machine is greatly reduced
Trang 38Rainbow Table Attack
Trang 39Rainbow Tables
v Generating a rainbow table requires a significant amount
of time
v Rainbow table advantages
v Can be used repeatedly for attacks on other passwords
v Rainbow tables are much faster than dictionary attacks
v The amount of time needed on the attacking machine is greatly reduced
Trang 40v Hashing algorithm should include a random sequence of bits
as input along with the user-created password
v These random bits are known as a salt
v Make brute force, dictionary, and rainbow table attacks much more difficult
Trang 41No Salt!
v To make hashing stronger, add a random "Salt" to a password before hashing it
v Windows doesn't salt its hash!
v Two accounts with the same password hash to the same result, even in Windows 7!
v This makes it possible to speed up password cracking with precomputed Rainbow Tables
Trang 43Linux Salts its Hashes
Trang 45Domain Password Policy
v Setting password restrictions for a Windows domain can
be accomplished through the Windows Domain password policy
v There are six common domain password policy settings, called password setting objects
v Used to build a domain password policy
Trang 46Domain Password Policy
Trang 47Access Control Methods
v The methods to implement access control are divided into two broad categories
v Logical access control
v Physical access control
Trang 48Physical Access Control
v Physical access control primarily protects computer equipment
v Designed to prevent unauthorized users from gaining physical access to equipment in order to use, steal, or vandalize it
v Physical access control includes computer security, door security, mantraps, video surveillance, and physical access logs
Trang 49Physical Computer Security
v Physically securing network servers in an organization is essential
v Rack-mounted servers
v 4.45 centimeters (1.75 inches) tall
v Can be stacked with up to 50 other servers in a closely confined area
v KVM (Keyboard, Video, Mouse) Switch
v Needed to connect to the servers
v Can be password-protected
Trang 50Physical Computer Security
Trang 52requires only a key for unlocking the door from the outside
person, unless it has been set to remain unlocked
minimal
Trang 53Deadbolt lock
v Extends a solid metal bar into the door frame
v Much more difficult to defeat than preset locks
v Requires that the key be used to both open and lock the door
Trang 54Lock Best Practices
v Change locks immediately upon loss or theft of keys
v Inspect all locks on a regular basis
v Issue keys only to authorized persons
v Keep records of who uses and turns in keys
v Keep track of keys issued, with their number and identification
v Master keys should not have any marks identifying them
as masters
Trang 55Lock Best Practices
v Secure unused keys in a locked safe
v Set up a procedure to monitor the use of all locks and keys and update the procedure as necessary
v When making duplicates of master keys, mark them “Do Not Duplicate,” and wipe out the manufacturer’s serial numbers to keep duplicates from being ordered
Trang 56Cipher Lock
v Combination locks that use buttons that must be pushed in the proper sequence
to open the door
v Can be programmed to allow only the code of certain individuals to be valid on specific dates and times
v Cipher locks also keep a record of when the door was opened and by which code
v Cipher locks are typically connected to
a networked computer system
v Can be monitored and controlled from one central location
Trang 57Cipher Lock Disadvantages
v Basic models can cost several hundred dollars while advanced models can be even more expensive
v Users must be careful to conceal which buttons they push
to avoid someone seeing or photographing the combination
Trang 58Tailgate Sensor
v Uses infrared beams that are aimed across a doorway
v Can detect if a second person walks through the beam array immediately behind (“tailgates”) the first person
v Without presenting credentials
Trang 59Physical Tokens
v Objects to identify users
v ID Badge
v The most common types of physical tokens
v ID badges originally were visually screened by security guards
v Today, ID badges can be fitted with tiny radio frequency identification (RFID) tags
the door with the badge in her pocket
Trang 60RFID tag
Trang 61v Before entering a secure area, a person must enter the mantrap
v A small room like an elevator
v If their ID is not valid, they are trapped there until the police arrive
v Mantraps are used at high-security areas where only authorized persons are allowed to enter
v Such as sensitive data processing areas, cash handling areas, critical research labs, security control rooms, and automated airline passenger entry portals
Trang 62Mantrap
Trang 63Video Surveillance
v Closed circuit television (CCTV)
v Using video cameras to transmit a signal to a specific and limited set of receivers
v Some CCTV cameras are fixed in a single position pointed
at a door or a hallway
v Other cameras resemble a small dome and allow the security technician to move the camera 360 degrees for a full panoramic view
Trang 64Physical Access Log
v A record or list of individuals who entered a secure area, the time that they entered, and the time they left the area
v Can also identify if unauthorized personnel have accessed
a secure area
v Physical access logs originally were paper documents
v Today, door access systems and physical tokens can generate electronic log documents