SlideShare a Scribd company logo
Broken Authentication and
Authorization
RM Manahari Pemarathna
Master in Information System Management, USC
OUTLINE
Authentication
Authorization
Why this happen?
Impact to the Organization
How can we fix this issue
Known Security Incidents
Authentication
Authentication is the process of determining whether someone or
something is, in fact, who or what it declares itself to be
Authentication technology provides access control for systems by
checking to see if a user's credentials match the credentials in a
database of authorized users or in a data authentication server
3 Categories
What you know?
What you have?
What you are?
Main types of Authentication
• Password based authentication
• Certificate based authentication
• E-token based authentication
• Biometric based authentication
Types of
authentication
Password based Authentication
Most common form
May be a string of alphabets, numbers and special characters
To be known by the ENTITY or the THING or a PERSON
Certificate Based Authentication
• A Digital Document
• Includes Distinguished Name (DN) and associated public key
• Sign by trusted party called Certificate Authority
• Certificate based authentication is stronger as compared to password
based authentication
• HAVE something rather than KNOW
E-token Based Authentication
Small device which generates a new random value every time it is
used
Random value become a basis for authentication
Can be implemented in USB key fob or a smart card
Data physically protected on the device
Store passwords, digital signatures and certificates and passwords
Biometric based Authentication
Biometrics means identification of humans by their characteristics
such as fingerprint, voice, iris pattern of the eye, vein pattern, etc.
Form of identification and access control
Authorization
Authorization is a security mechanism used to determine user/client
privileges or access levels related to system resources, including
computer programs, files, services, data and application features
Authorization is normally preceded by authentication for user
identity verification
Example
For example, if a user tries to access a file that resides on a file server, it
will be the responsibility of the file service to determine whether the
user will be allowed this type of access
Why this happen?
When authentication functions related to the application are not implemented correctly
by developers, it allows hackers to compromise passwords or session ID's or to exploit
other implementation flaws using other users credentials
User authentication credentials are not protected when stored.
Predictable login credentials
Passwords, session IDs, and other credentials are sent over unencrypted connections
Impact to the Organization
• Valuable Business information can be leaked
• Customer dissatisfy with the organization
• Image of the company will loose
• Disclosure, improper modification, or unavailability of information may incur expenses
• Missed profits for the organization
Can we fix this issue ?
• Mapping Authentication Token and user ID
• Proper Session Invalidation - Session should always invalidate at login.
• Attackers cannot use session to access accounts.
• Prevent Guessable User Identifier in cookie - Most of the times you generate the user ID
sequentially so it is very easy to guess, so correct way is to generate a random identifier, associate it with the user and only
store the Random ID in the cookie.
• Strong password reset functionality - ex. Verify if the sender is the real user by asking verification
questions.
• Application data should not contain sensitive information
• Response body should not contain debugging error message -Proper
• exceptions handling instead of returning an error code.
Recommendations to prevent Authentication Bypass
Can we fix this issue ?
 Mapping user role with session ID
 Prevent from GUI-Based/ Client side privilege implementation
 Proper access control mechanism - Security technique that regulates who or what can view or use
resources in a computing environment.
- Mandatory Access Control (MAC) - Rule-based access control
- Discretionary access control (DAC) - Attribute-based access control (ABAC)
- Role-Based Assess Control (RBAC)
The goal of access control is to minimize the risk of unauthorized access to physical and logical systems.
 Not using IDOR (Insecure Direct Object Reference) - Variables in the application
such as “id”, “pid”, “uid” are often seen as HTTP parameters. they can be found in headers and cookies.
The attacker can access, edit or delete any of other users’ objects by changing the values.
 Use Server Side validation - Sever side validation is much secure than client side validation
Recommendations to prevent Authorization Bypass
Known Security Incidents
THE USPS(UNITED STATES PARCEL SERVICE )API INFORMATION LEAK
INCIDENT - Insufficient authorization Control
The security weaknesses leaked account data for around 60 million users. Any malicious user logged in the
system could exploit the API to collect user data by simply introducing wildcard characters in a search
function of the API.
Essentially, the root cause of the USPS incident is having insufficient authorization controls, which in turn
allow attackers to retrieve (and modify) data beyond their lawful control.
Known Security Incidents
• Password was stolen from a payroll executives smart phone on CLEANTECH
• it has been Highly effected on payroll system. There are 4500 Employees in Cleantech.
• Hacker was modified Bank Account nos of Employee’s in database.
• Ultimately large Number of Employees Monthly salaries was rejected and transferred to unknown account nos.
• Incident is disaster for the company.
• Company has organized a password security awareness
Program for staff members.
Known Security Incidents
50 Million Robbery on ABS due to unauthorized Access into Mtransit web Based system.
• Hacker attacked abs mail server and acquired 2 cash collecting officer’s user-ids and passwords.
• mTransit system has been accessed and got all cash collection and transit details.
• Route,Vehicleno,Collected amt ,approximately delivery time etc.
• They submitted these valuable information to robbery team
and they was stolen huge amount of cash on kurunagala -Colombo route.
Thank You

More Related Content

What's hot

Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
Nothing Nowhere
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
n|u - The Open Security Community
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
Adeel Javaid
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
Priyanka Aash
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
Roshan Ranabhat
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
Software Guru
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 
Web application security
Web application securityWeb application security
Web application security
Kapil Sharma
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
Amit Tyagi
 
OWASP Top Ten
OWASP Top TenOWASP Top Ten
OWASP Top Ten
Christian Heinrich
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
Nitesh Dubey
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
Chris Gates
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open Redirect
Blueinfy Solutions
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
Frank Victory
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner
 
Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
Michael Hendrickx
 
Introduction to path traversal attack
Introduction to path traversal attackIntroduction to path traversal attack
Introduction to path traversal attack
Prashant Hegde
 

What's hot (20)

Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Deep dive into ssrf
Deep dive into ssrfDeep dive into ssrf
Deep dive into ssrf
 
A Brief History of Cryptographic Failures
A Brief History of Cryptographic FailuresA Brief History of Cryptographic Failures
A Brief History of Cryptographic Failures
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
OWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application VulnerabilitiesOWASP Top 10 Web Application Vulnerabilities
OWASP Top 10 Web Application Vulnerabilities
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Web application security
Web application securityWeb application security
Web application security
 
Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)Cross Site Scripting ( XSS)
Cross Site Scripting ( XSS)
 
OWASP Top Ten
OWASP Top TenOWASP Top Ten
OWASP Top Ten
 
Ethical hacking ppt
Ethical hacking pptEthical hacking ppt
Ethical hacking ppt
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open Redirect
 
Authentication vs authorization
Authentication vs authorizationAuthentication vs authorization
Authentication vs authorization
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
 
Introduction to path traversal attack
Introduction to path traversal attackIntroduction to path traversal attack
Introduction to path traversal attack
 

Similar to Broken Authentication and Authorization(1).pptx

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
Piyush Jain
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
csandit
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
Richard Diver
 
Co p
Co pCo p
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
Government Technology Exhibition and Conference
 
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptxONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
spommmari
 
Co p
Co pCo p
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity Defined Security Alliance
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Jack Forbes
 
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPSUSING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
ForgeRock
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
Kabul Education University
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
Krishnendu Paul
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
AbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptxAbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptx
AbedElElahElMHMOOM
 
How an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdfHow an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdf
rpacpc
 
Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018 Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018
Identity Defined Security Alliance
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
North Texas Chapter of the ISSA
 

Similar to Broken Authentication and Authorization(1).pptx (20)

CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Co p
Co pCo p
Co p
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptxONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
ONLINE ID CARD REGISTRATION AND GENARATION SYSTEM.pptx
 
Co p
Co pCo p
Co p
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPSUSING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
USING BEHAVIOR TO IMPROVE SECURITY AND ENHANCE RELATIONSHIPS
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
AbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptxAbedElilahElmahmoumP1.pptx
AbedElilahElmahmoumP1.pptx
 
How an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdfHow an Identity Verification Platform Can Safeguard Your Business.pdf
How an Identity Verification Platform Can Safeguard Your Business.pdf
 
Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018 Silicon Valley IDSA Meetup October 2018
Silicon Valley IDSA Meetup October 2018
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 

More from Manahari Darshika Pemarathna

Knowledge Management with Developing Nation (1) (1).pptx
Knowledge Management with Developing Nation (1) (1).pptxKnowledge Management with Developing Nation (1) (1).pptx
Knowledge Management with Developing Nation (1) (1).pptx
Manahari Darshika Pemarathna
 
PePlus Environment analysis.pptx
PePlus Environment analysis.pptxPePlus Environment analysis.pptx
PePlus Environment analysis.pptx
Manahari Darshika Pemarathna
 
Amazon GO.pptx
Amazon GO.pptxAmazon GO.pptx
H2007054652
H2007054652H2007054652
Bad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lankaBad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lanka
Manahari Darshika Pemarathna
 
Location based marketing and advertising
Location based marketing and advertisingLocation based marketing and advertising
Location based marketing and advertising
Manahari Darshika Pemarathna
 
Information Technology Professionalism
Information Technology ProfessionalismInformation Technology Professionalism
Information Technology Professionalism
Manahari Darshika Pemarathna
 
Information systems
Information systemsInformation systems
Information systems
Manahari Darshika Pemarathna
 
Strategic alignment
Strategic alignmentStrategic alignment
Strategic alignment
Manahari Darshika Pemarathna
 

More from Manahari Darshika Pemarathna (9)

Knowledge Management with Developing Nation (1) (1).pptx
Knowledge Management with Developing Nation (1) (1).pptxKnowledge Management with Developing Nation (1) (1).pptx
Knowledge Management with Developing Nation (1) (1).pptx
 
PePlus Environment analysis.pptx
PePlus Environment analysis.pptxPePlus Environment analysis.pptx
PePlus Environment analysis.pptx
 
Amazon GO.pptx
Amazon GO.pptxAmazon GO.pptx
Amazon GO.pptx
 
H2007054652
H2007054652H2007054652
H2007054652
 
Bad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lankaBad netiquette of_digital_citizen_in_sri_lanka
Bad netiquette of_digital_citizen_in_sri_lanka
 
Location based marketing and advertising
Location based marketing and advertisingLocation based marketing and advertising
Location based marketing and advertising
 
Information Technology Professionalism
Information Technology ProfessionalismInformation Technology Professionalism
Information Technology Professionalism
 
Information systems
Information systemsInformation systems
Information systems
 
Strategic alignment
Strategic alignmentStrategic alignment
Strategic alignment
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Broken Authentication and Authorization(1).pptx

  • 1. Broken Authentication and Authorization RM Manahari Pemarathna Master in Information System Management, USC
  • 2. OUTLINE Authentication Authorization Why this happen? Impact to the Organization How can we fix this issue Known Security Incidents
  • 3.
  • 4. Authentication Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be Authentication technology provides access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server
  • 5. 3 Categories What you know? What you have? What you are?
  • 6. Main types of Authentication • Password based authentication • Certificate based authentication • E-token based authentication • Biometric based authentication Types of authentication
  • 7.
  • 8. Password based Authentication Most common form May be a string of alphabets, numbers and special characters To be known by the ENTITY or the THING or a PERSON
  • 9.
  • 10. Certificate Based Authentication • A Digital Document • Includes Distinguished Name (DN) and associated public key • Sign by trusted party called Certificate Authority • Certificate based authentication is stronger as compared to password based authentication • HAVE something rather than KNOW
  • 11.
  • 12. E-token Based Authentication Small device which generates a new random value every time it is used Random value become a basis for authentication Can be implemented in USB key fob or a smart card Data physically protected on the device Store passwords, digital signatures and certificates and passwords
  • 13.
  • 14. Biometric based Authentication Biometrics means identification of humans by their characteristics such as fingerprint, voice, iris pattern of the eye, vein pattern, etc. Form of identification and access control
  • 15.
  • 16. Authorization Authorization is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features Authorization is normally preceded by authentication for user identity verification
  • 17. Example For example, if a user tries to access a file that resides on a file server, it will be the responsibility of the file service to determine whether the user will be allowed this type of access
  • 18. Why this happen? When authentication functions related to the application are not implemented correctly by developers, it allows hackers to compromise passwords or session ID's or to exploit other implementation flaws using other users credentials User authentication credentials are not protected when stored. Predictable login credentials Passwords, session IDs, and other credentials are sent over unencrypted connections
  • 19. Impact to the Organization • Valuable Business information can be leaked • Customer dissatisfy with the organization • Image of the company will loose • Disclosure, improper modification, or unavailability of information may incur expenses • Missed profits for the organization
  • 20. Can we fix this issue ? • Mapping Authentication Token and user ID • Proper Session Invalidation - Session should always invalidate at login. • Attackers cannot use session to access accounts. • Prevent Guessable User Identifier in cookie - Most of the times you generate the user ID sequentially so it is very easy to guess, so correct way is to generate a random identifier, associate it with the user and only store the Random ID in the cookie. • Strong password reset functionality - ex. Verify if the sender is the real user by asking verification questions. • Application data should not contain sensitive information • Response body should not contain debugging error message -Proper • exceptions handling instead of returning an error code. Recommendations to prevent Authentication Bypass
  • 21. Can we fix this issue ?  Mapping user role with session ID  Prevent from GUI-Based/ Client side privilege implementation  Proper access control mechanism - Security technique that regulates who or what can view or use resources in a computing environment. - Mandatory Access Control (MAC) - Rule-based access control - Discretionary access control (DAC) - Attribute-based access control (ABAC) - Role-Based Assess Control (RBAC) The goal of access control is to minimize the risk of unauthorized access to physical and logical systems.  Not using IDOR (Insecure Direct Object Reference) - Variables in the application such as “id”, “pid”, “uid” are often seen as HTTP parameters. they can be found in headers and cookies. The attacker can access, edit or delete any of other users’ objects by changing the values.  Use Server Side validation - Sever side validation is much secure than client side validation Recommendations to prevent Authorization Bypass
  • 22. Known Security Incidents THE USPS(UNITED STATES PARCEL SERVICE )API INFORMATION LEAK INCIDENT - Insufficient authorization Control The security weaknesses leaked account data for around 60 million users. Any malicious user logged in the system could exploit the API to collect user data by simply introducing wildcard characters in a search function of the API. Essentially, the root cause of the USPS incident is having insufficient authorization controls, which in turn allow attackers to retrieve (and modify) data beyond their lawful control.
  • 23. Known Security Incidents • Password was stolen from a payroll executives smart phone on CLEANTECH • it has been Highly effected on payroll system. There are 4500 Employees in Cleantech. • Hacker was modified Bank Account nos of Employee’s in database. • Ultimately large Number of Employees Monthly salaries was rejected and transferred to unknown account nos. • Incident is disaster for the company. • Company has organized a password security awareness Program for staff members.
  • 24. Known Security Incidents 50 Million Robbery on ABS due to unauthorized Access into Mtransit web Based system. • Hacker attacked abs mail server and acquired 2 cash collecting officer’s user-ids and passwords. • mTransit system has been accessed and got all cash collection and transit details. • Route,Vehicleno,Collected amt ,approximately delivery time etc. • They submitted these valuable information to robbery team and they was stolen huge amount of cash on kurunagala -Colombo route.

Editor's Notes

  1. Confirm identity of person or software program Verifying validitity of identification
  2. What you know (Passsword,PIN) What you have (e-toent, RFID,Certificate) What you are (Bio metrics)
  3. System administrators (SA) are typically assigned permission levels covering all system and user resources During authorization, a system verifies an authenticated user's access rules and either grants or refuses resource access