SlideShare a Scribd company logo
Lecture #2: Defence Strategies and Techniques: Part I
Dr.Ramchandra Mangrulkar
August 5, 2020
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 1 / 15
Outline...
Access Control
Data Protection
Prevention and Detection
Response, Recovery and Forensics
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 2 / 15
Access Control
First Strategy
Security technique that regulates who or what can view
Selective restriction of access to a place or other resource
Fundamental concept in security that minimizes risk to the business
or organization.
Two Types : Physical and Logical.
Physical access control limits access to campuses, buildings, rooms
and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
Access Control
First Strategy
Security technique that regulates who or what can view
Selective restriction of access to a place or other resource
Fundamental concept in security that minimizes risk to the business
or organization.
Two Types : Physical and Logical.
Physical access control limits access to campuses, buildings, rooms
and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
Access Control
First Strategy
Security technique that regulates who or what can view
Selective restriction of access to a place or other resource
Fundamental concept in security that minimizes risk to the business
or organization.
Two Types : Physical and Logical.
Physical access control limits access to campuses, buildings, rooms
and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
Access Control
First Strategy
Security technique that regulates who or what can view
Selective restriction of access to a place or other resource
Fundamental concept in security that minimizes risk to the business
or organization.
Two Types : Physical and Logical.
Physical access control limits access to campuses, buildings, rooms
and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
Access Control
First Strategy
Security technique that regulates who or what can view
Selective restriction of access to a place or other resource
Fundamental concept in security that minimizes risk to the business
or organization.
Two Types : Physical and Logical.
Physical access control limits access to campuses, buildings, rooms
and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
Access Control
First Strategy
Security technique that regulates who or what can view
Selective restriction of access to a place or other resource
Fundamental concept in security that minimizes risk to the business
or organization.
Two Types : Physical and Logical.
Physical access control limits access to campuses, buildings, rooms
and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
Access Control
First Strategy
Security technique that regulates who or what can view
Selective restriction of access to a place or other resource
Fundamental concept in security that minimizes risk to the business
or organization.
Two Types : Physical and Logical.
Physical access control limits access to campuses, buildings, rooms
and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
Access Control(Continue...)
Authentication and Authorization1
Authentication Methods (Three-factor authentication) :
Something you know (Something I know)
Something you have (Something I Have)
Something you are (Something I am)
1
https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to-
identity-credentials
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
Access Control(Continue...)
Authentication and Authorization1
Authentication Methods (Three-factor authentication) :
Something you know (Something I know)
Something you have (Something I Have)
Something you are (Something I am)
1
https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to-
identity-credentials
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
Access Control(Continue...)
Authentication and Authorization1
Authentication Methods (Three-factor authentication) :
Something you know (Something I know)
Something you have (Something I Have)
Something you are (Something I am)
1
https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to-
identity-credentials
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
Access Control(Continue...)
Authentication and Authorization1
Authentication Methods (Three-factor authentication) :
Something you know (Something I know)
Something you have (Something I Have)
Something you are (Something I am)
1
https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to-
identity-credentials
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
Access Control(Continue...)
Authentication and Authorization1
Authentication Methods (Three-factor authentication) :
Something you know (Something I know)
Something you have (Something I Have)
Something you are (Something I am)
1
https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to-
identity-credentials
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
Something you know
Something you know (Something I know)
Only user of system know
-e.g. Password, Pin
-knowledge of a secret distinguishes you from all other individuals
-system simply needs to check to see if the person claiming to be you
knows the secret
-An attacker can last steal this kind of credential
people will tend to choose passwords that are easy to remember,
which usually means that the password is easy to guess
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 5 / 15
Something you know
Something you know (Something I know)
Only user of system know
-e.g. Password, Pin
-knowledge of a secret distinguishes you from all other individuals
-system simply needs to check to see if the person claiming to be you
knows the secret
-An attacker can last steal this kind of credential
people will tend to choose passwords that are easy to remember,
which usually means that the password is easy to guess
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 5 / 15
Something you know
Something you know (Something I know)
Only user of system know
-e.g. Password, Pin
-knowledge of a secret distinguishes you from all other individuals
-system simply needs to check to see if the person claiming to be you
knows the secret
-An attacker can last steal this kind of credential
people will tend to choose passwords that are easy to remember,
which usually means that the password is easy to guess
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 5 / 15
Something you know
Changing a password requires human intervention. Thus,
compromised passwords could remain valid for longer than is desirable.
And there must be some mechanism for resetting the password
(because passwords will get forgotten and compromised).
This mechanism could itself be vulnerable to social-engineering
attacks, which rely on convincing a human with the authority to
change or access information that it is necessary to do so.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 6 / 15
Something you know
Changing a password requires human intervention. Thus,
compromised passwords could remain valid for longer than is desirable.
And there must be some mechanism for resetting the password
(because passwords will get forgotten and compromised).
This mechanism could itself be vulnerable to social-engineering
attacks, which rely on convincing a human with the authority to
change or access information that it is necessary to do so.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 6 / 15
Something you know
Changing a password requires human intervention. Thus,
compromised passwords could remain valid for longer than is desirable.
And there must be some mechanism for resetting the password
(because passwords will get forgotten and compromised).
This mechanism could itself be vulnerable to social-engineering
attacks, which rely on convincing a human with the authority to
change or access information that it is necessary to do so.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 6 / 15
Something you know
There are three dimensions2
Length
- Longer passwords are better - A good way to get a long password
that is seemingly random yet easy to remember
- e.g. like the first words of a song and then generate the password
from the first letters of the passphrase.
Character set -more characters...greater the number of possible
combinations of characters
-so the larger the password space... require doing more work by an
attacker.
Randomness
- Mathematically, it turns out that English has about 1.3 bits of
information per character. Thus it takes 49 characters to get 64 bits
of ”secret”, which comes out to about 10 words (at 5 characters on
average per word).
2
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
Something you know
There are three dimensions2
Length
- Longer passwords are better - A good way to get a long password
that is seemingly random yet easy to remember
- e.g. like the first words of a song and then generate the password
from the first letters of the passphrase.
Character set -more characters...greater the number of possible
combinations of characters
-so the larger the password space... require doing more work by an
attacker.
Randomness
- Mathematically, it turns out that English has about 1.3 bits of
information per character. Thus it takes 49 characters to get 64 bits
of ”secret”, which comes out to about 10 words (at 5 characters on
average per word).
2
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
Something you know
There are three dimensions2
Length
- Longer passwords are better - A good way to get a long password
that is seemingly random yet easy to remember
- e.g. like the first words of a song and then generate the password
from the first letters of the passphrase.
Character set -more characters...greater the number of possible
combinations of characters
-so the larger the password space... require doing more work by an
attacker.
Randomness
- Mathematically, it turns out that English has about 1.3 bits of
information per character. Thus it takes 49 characters to get 64 bits
of ”secret”, which comes out to about 10 words (at 5 characters on
average per word).
2
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
Something you know
There are three dimensions2
Length
- Longer passwords are better - A good way to get a long password
that is seemingly random yet easy to remember
- e.g. like the first words of a song and then generate the password
from the first letters of the passphrase.
Character set -more characters...greater the number of possible
combinations of characters
-so the larger the password space... require doing more work by an
attacker.
Randomness
- Mathematically, it turns out that English has about 1.3 bits of
information per character. Thus it takes 49 characters to get 64 bits
of ”secret”, which comes out to about 10 words (at 5 characters on
average per word).
2
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
Something you know : more on ”Password”
Password stored as HASH value
possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored
password hashes. - if matched, the attacker has learned a password.
Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed.
system stores both h(password + salt) and the salt for each account
Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each
account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline
dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every
user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one.
Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the
system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays.
Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every
possible value of a 12 bit salt in 1 hour.
Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3
3
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
Something you know : more on ”Password”
Password stored as HASH value
possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored
password hashes. - if matched, the attacker has learned a password.
Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed.
system stores both h(password + salt) and the salt for each account
Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each
account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline
dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every
user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one.
Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the
system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays.
Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every
possible value of a 12 bit salt in 1 hour.
Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3
3
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
Something you know : more on ”Password”
Password stored as HASH value
possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored
password hashes. - if matched, the attacker has learned a password.
Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed.
system stores both h(password + salt) and the salt for each account
Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each
account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline
dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every
user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one.
Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the
system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays.
Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every
possible value of a 12 bit salt in 1 hour.
Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3
3
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
Something you know : more on ”Password”
Password stored as HASH value
possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored
password hashes. - if matched, the attacker has learned a password.
Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed.
system stores both h(password + salt) and the salt for each account
Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each
account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline
dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every
user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one.
Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the
system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays.
Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every
possible value of a 12 bit salt in 1 hour.
Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3
3
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
Something you know : more on ”Password”
Password stored as HASH value
possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored
password hashes. - if matched, the attacker has learned a password.
Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed.
system stores both h(password + salt) and the salt for each account
Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each
account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline
dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every
user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one.
Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the
system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays.
Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every
possible value of a 12 bit salt in 1 hour.
Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3
3
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
Something you know : more on ”Password”
Password stored as HASH value
possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored
password hashes. - if matched, the attacker has learned a password.
Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed.
system stores both h(password + salt) and the salt for each account
Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each
account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline
dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every
user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one.
Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the
system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays.
Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every
possible value of a 12 bit salt in 1 hour.
Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3
3
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
Something you know : more on ”Password”
Password stored as HASH value
possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored
password hashes. - if matched, the attacker has learned a password.
Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed.
system stores both h(password + salt) and the salt for each account
Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each
account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline
dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every
user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one.
Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the
system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays.
Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every
possible value of a 12 bit salt in 1 hour.
Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3
3
https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
Something you have (Something I Have)
Something you have (Something I Have)
e.g. Certificate, I-card, Smart Card
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 9 / 15
Something you have (Something I Have)
Something you have (Something I Have)
e.g. Certificate, I-card, Smart Card
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 9 / 15
Something you have (Something I Have)
A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to
duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around
these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the
card is used.
Proximity card or RFID. These cards transmit stored information to a monitor via RF.
Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of
cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart
card transforms the authentication problem for humans, because we are no longer constrained by stringent
computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks.
One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id
encrypts with a different key.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
Something you have (Something I Have)
A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to
duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around
these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the
card is used.
Proximity card or RFID. These cards transmit stored information to a monitor via RF.
Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of
cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart
card transforms the authentication problem for humans, because we are no longer constrained by stringent
computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks.
One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id
encrypts with a different key.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
Something you have (Something I Have)
A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to
duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around
these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the
card is used.
Proximity card or RFID. These cards transmit stored information to a monitor via RF.
Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of
cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart
card transforms the authentication problem for humans, because we are no longer constrained by stringent
computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks.
One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id
encrypts with a different key.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
Something you have (Something I Have)
A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to
duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around
these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the
card is used.
Proximity card or RFID. These cards transmit stored information to a monitor via RF.
Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of
cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart
card transforms the authentication problem for humans, because we are no longer constrained by stringent
computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks.
One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id
encrypts with a different key.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
Something you are (Something I am)
Something you are (Something I am)
e.g. Certificate, I-card, Smart Card
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 11 / 15
Something you are (Something I am)
Something you are (Something I am)
e.g. Certificate, I-card, Smart Card
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 11 / 15
Something you are (Something I am)
employ behavioral and physiological characteristics
we might use Retinal scan, Fingerprint reader, Handprint reader,
Voice print, Keystroke timing ,Signature
with some agreed error rate (For example, fingerprint readers today
normally exhibit error rates upwards of 5%.)
Methods to subvert a fingerprint reader give some indication of the
difficulties of deploying unsupervised biometric sensors as the sole
means of authenticating humans.
-Steal a finger
-Steal a fingerprint
-Replace the biometric sensor
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
Something you are (Something I am)
employ behavioral and physiological characteristics
we might use Retinal scan, Fingerprint reader, Handprint reader,
Voice print, Keystroke timing ,Signature
with some agreed error rate (For example, fingerprint readers today
normally exhibit error rates upwards of 5%.)
Methods to subvert a fingerprint reader give some indication of the
difficulties of deploying unsupervised biometric sensors as the sole
means of authenticating humans.
-Steal a finger
-Steal a fingerprint
-Replace the biometric sensor
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
Something you are (Something I am)
employ behavioral and physiological characteristics
we might use Retinal scan, Fingerprint reader, Handprint reader,
Voice print, Keystroke timing ,Signature
with some agreed error rate (For example, fingerprint readers today
normally exhibit error rates upwards of 5%.)
Methods to subvert a fingerprint reader give some indication of the
difficulties of deploying unsupervised biometric sensors as the sole
means of authenticating humans.
-Steal a finger
-Steal a fingerprint
-Replace the biometric sensor
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
Something you are (Something I am)
employ behavioral and physiological characteristics
we might use Retinal scan, Fingerprint reader, Handprint reader,
Voice print, Keystroke timing ,Signature
with some agreed error rate (For example, fingerprint readers today
normally exhibit error rates upwards of 5%.)
Methods to subvert a fingerprint reader give some indication of the
difficulties of deploying unsupervised biometric sensors as the sole
means of authenticating humans.
-Steal a finger
-Steal a fingerprint
-Replace the biometric sensor
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
Something you are (Something I am)
There are several well known problems with biometric-based
authentication schemes:
-Reliability of the method
-Cost and availability
-Unwillingness or inability to interact with biometric input devices
-Compromise the biometric database or system
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 13 / 15
Research Problem 2
Post 9/11, the United States started searching airline passengers for bombs
and other potentially dangerous material. More recently, in reaction to the
Madrid and London subway bombings, other governments have started
searching subway customers.
In all of these schemes, the cost of searching a suspect is significant and it is
too costly to search every passenger. Some sort of sampling is then
employed, which leads to a design choice about who gets selected for
searches:
Select randomly among all passengers.
Select randomly among passengers satisfying certain predefined profiles.
Adopt (1) and you end up searching babies, grandmothers, and congressman;
adopt (2) and you might only search males of a certain age and ethnicity.
Given a fixed budget for performing searches, which of (1) and (2) is likely
to be more effective at decreasing the chances of successful future terrorist
attacks on airplanes and/or subways.
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 14 / 15
Authentication Protocols
Different Categories of Authentication Protocols:
Reciprocity of Authentication (Mutual/One Way)
Type of Cryptography (Symmetric/Asymmetric)
Key Exchange
Computational and Communication Efficiency
Real time involvement of Third Party (online vs offline)
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
Authentication Protocols
Different Categories of Authentication Protocols:
Reciprocity of Authentication (Mutual/One Way)
Type of Cryptography (Symmetric/Asymmetric)
Key Exchange
Computational and Communication Efficiency
Real time involvement of Third Party (online vs offline)
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
Authentication Protocols
Different Categories of Authentication Protocols:
Reciprocity of Authentication (Mutual/One Way)
Type of Cryptography (Symmetric/Asymmetric)
Key Exchange
Computational and Communication Efficiency
Real time involvement of Third Party (online vs offline)
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
Authentication Protocols
Different Categories of Authentication Protocols:
Reciprocity of Authentication (Mutual/One Way)
Type of Cryptography (Symmetric/Asymmetric)
Key Exchange
Computational and Communication Efficiency
Real time involvement of Third Party (online vs offline)
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
Authentication Protocols
Different Categories of Authentication Protocols:
Reciprocity of Authentication (Mutual/One Way)
Type of Cryptography (Symmetric/Asymmetric)
Key Exchange
Computational and Communication Efficiency
Real time involvement of Third Party (online vs offline)
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
Authentication Protocols
Different Categories of Authentication Protocols:
Reciprocity of Authentication (Mutual/One Way)
Type of Cryptography (Symmetric/Asymmetric)
Key Exchange
Computational and Communication Efficiency
Real time involvement of Third Party (online vs offline)
Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15

More Related Content

What's hot

PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
Pace IT at Edmonds Community College
 
Blackbox Testing in AI Cybersecurity
Blackbox Testing in AI CybersecurityBlackbox Testing in AI Cybersecurity
Blackbox Testing in AI Cybersecurity
ShauryaGupta38
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
SahilRao25
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
Vikas Jain
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
Pace IT at Edmonds Community College
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
Nishant Mehta
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
Infosec
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
Tahseen Shabab
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
OWASP Delhi
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
Pace IT at Edmonds Community College
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
n|u - The Open Security Community
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
NUS-ISS
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
ShivamSharma909
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
Sergey Gordeychik
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
Pranto26
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
DavisMurphyC75
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
Rishi Kant
 

What's hot (20)

PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 
Blackbox Testing in AI Cybersecurity
Blackbox Testing in AI CybersecurityBlackbox Testing in AI Cybersecurity
Blackbox Testing in AI Cybersecurity
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
PACE-IT, Security+ 6.2: Cryptographic Methods (part 1)
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurityFrom machine learning to deepfakes - how AI is revolutionizing cybersecurity
From machine learning to deepfakes - how AI is revolutionizing cybersecurity
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
AI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for ThoughtAI and Cybersecurity - Food for Thought
AI and Cybersecurity - Food for Thought
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
 
Thesis presentation
Thesis presentationThesis presentation
Thesis presentation
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 

Similar to Lecture #2: Defence Strategies and Techniques (Security): Part I

BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
Drm Kapoor
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
NarangYadav
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
Suleiman55
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Vishesh Singhal
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET-  	  Impact of Ethical Hacking on Business and GovernmentsIRJET-  	  Impact of Ethical Hacking on Business and Governments
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET Journal
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
Raghav Bisht
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
asharshaikh8
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
Network Intelligence India
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
ijtsrd
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
SafeguardsintheworkplaceAdam Richards
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
homeworkping4
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
aryan532920
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
bartholomeocoombs
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
VaibhavYadav297587
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
NarangYadav
 

Similar to Lecture #2: Defence Strategies and Techniques (Security): Part I (20)

BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Ethical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptxEthical-Hacking-Course-After-12th.pptx
Ethical-Hacking-Course-After-12th.pptx
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
IRJET- Impact of Ethical Hacking on Business and Governments
IRJET-  	  Impact of Ethical Hacking on Business and GovernmentsIRJET-  	  Impact of Ethical Hacking on Business and Governments
IRJET- Impact of Ethical Hacking on Business and Governments
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
 
About the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docxAbout the PresentationsThe presentations cover the objectives .docx
About the PresentationsThe presentations cover the objectives .docx
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 
Concept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptxConcept-And-Scope-of-Ethical-Hacking.pptx
Concept-And-Scope-of-Ethical-Hacking.pptx
 

More from Dr. Ramchandra Mangrulkar

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
Dr. Ramchandra Mangrulkar
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
Dr. Ramchandra Mangrulkar
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Dr. Ramchandra Mangrulkar
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Dr. Ramchandra Mangrulkar
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
Dr. Ramchandra Mangrulkar
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
Dr. Ramchandra Mangrulkar
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
Dr. Ramchandra Mangrulkar
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
Dr. Ramchandra Mangrulkar
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
Dr. Ramchandra Mangrulkar
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
Dr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
Dr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
Dr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
Dr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Dr. Ramchandra Mangrulkar
 
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest StatisticsLecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Dr. Ramchandra Mangrulkar
 

More from Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
 
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest StatisticsLecture #1: Access Control : Various Cyber attacks and Latest Statistics
Lecture #1: Access Control : Various Cyber attacks and Latest Statistics
 

Recently uploaded

COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 

Recently uploaded (20)

COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 

Lecture #2: Defence Strategies and Techniques (Security): Part I

  • 1. Lecture #2: Defence Strategies and Techniques: Part I Dr.Ramchandra Mangrulkar August 5, 2020 Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 1 / 15
  • 2. Outline... Access Control Data Protection Prevention and Detection Response, Recovery and Forensics Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 2 / 15
  • 3. Access Control First Strategy Security technique that regulates who or what can view Selective restriction of access to a place or other resource Fundamental concept in security that minimizes risk to the business or organization. Two Types : Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
  • 4. Access Control First Strategy Security technique that regulates who or what can view Selective restriction of access to a place or other resource Fundamental concept in security that minimizes risk to the business or organization. Two Types : Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
  • 5. Access Control First Strategy Security technique that regulates who or what can view Selective restriction of access to a place or other resource Fundamental concept in security that minimizes risk to the business or organization. Two Types : Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
  • 6. Access Control First Strategy Security technique that regulates who or what can view Selective restriction of access to a place or other resource Fundamental concept in security that minimizes risk to the business or organization. Two Types : Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
  • 7. Access Control First Strategy Security technique that regulates who or what can view Selective restriction of access to a place or other resource Fundamental concept in security that minimizes risk to the business or organization. Two Types : Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
  • 8. Access Control First Strategy Security technique that regulates who or what can view Selective restriction of access to a place or other resource Fundamental concept in security that minimizes risk to the business or organization. Two Types : Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
  • 9. Access Control First Strategy Security technique that regulates who or what can view Selective restriction of access to a place or other resource Fundamental concept in security that minimizes risk to the business or organization. Two Types : Physical and Logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access control limits connections to computer networks, system files and data. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 3 / 15
  • 10. Access Control(Continue...) Authentication and Authorization1 Authentication Methods (Three-factor authentication) : Something you know (Something I know) Something you have (Something I Have) Something you are (Something I am) 1 https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to- identity-credentials Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
  • 11. Access Control(Continue...) Authentication and Authorization1 Authentication Methods (Three-factor authentication) : Something you know (Something I know) Something you have (Something I Have) Something you are (Something I am) 1 https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to- identity-credentials Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
  • 12. Access Control(Continue...) Authentication and Authorization1 Authentication Methods (Three-factor authentication) : Something you know (Something I know) Something you have (Something I Have) Something you are (Something I am) 1 https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to- identity-credentials Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
  • 13. Access Control(Continue...) Authentication and Authorization1 Authentication Methods (Three-factor authentication) : Something you know (Something I know) Something you have (Something I Have) Something you are (Something I am) 1 https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to- identity-credentials Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
  • 14. Access Control(Continue...) Authentication and Authorization1 Authentication Methods (Three-factor authentication) : Something you know (Something I know) Something you have (Something I Have) Something you are (Something I am) 1 https://www.coursera.org/learn/cybersecurity/lecture/sQpu1/introduction-to- identity-credentials Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 4 / 15
  • 15. Something you know Something you know (Something I know) Only user of system know -e.g. Password, Pin -knowledge of a secret distinguishes you from all other individuals -system simply needs to check to see if the person claiming to be you knows the secret -An attacker can last steal this kind of credential people will tend to choose passwords that are easy to remember, which usually means that the password is easy to guess Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 5 / 15
  • 16. Something you know Something you know (Something I know) Only user of system know -e.g. Password, Pin -knowledge of a secret distinguishes you from all other individuals -system simply needs to check to see if the person claiming to be you knows the secret -An attacker can last steal this kind of credential people will tend to choose passwords that are easy to remember, which usually means that the password is easy to guess Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 5 / 15
  • 17. Something you know Something you know (Something I know) Only user of system know -e.g. Password, Pin -knowledge of a secret distinguishes you from all other individuals -system simply needs to check to see if the person claiming to be you knows the secret -An attacker can last steal this kind of credential people will tend to choose passwords that are easy to remember, which usually means that the password is easy to guess Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 5 / 15
  • 18. Something you know Changing a password requires human intervention. Thus, compromised passwords could remain valid for longer than is desirable. And there must be some mechanism for resetting the password (because passwords will get forgotten and compromised). This mechanism could itself be vulnerable to social-engineering attacks, which rely on convincing a human with the authority to change or access information that it is necessary to do so. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 6 / 15
  • 19. Something you know Changing a password requires human intervention. Thus, compromised passwords could remain valid for longer than is desirable. And there must be some mechanism for resetting the password (because passwords will get forgotten and compromised). This mechanism could itself be vulnerable to social-engineering attacks, which rely on convincing a human with the authority to change or access information that it is necessary to do so. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 6 / 15
  • 20. Something you know Changing a password requires human intervention. Thus, compromised passwords could remain valid for longer than is desirable. And there must be some mechanism for resetting the password (because passwords will get forgotten and compromised). This mechanism could itself be vulnerable to social-engineering attacks, which rely on convincing a human with the authority to change or access information that it is necessary to do so. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 6 / 15
  • 21. Something you know There are three dimensions2 Length - Longer passwords are better - A good way to get a long password that is seemingly random yet easy to remember - e.g. like the first words of a song and then generate the password from the first letters of the passphrase. Character set -more characters...greater the number of possible combinations of characters -so the larger the password space... require doing more work by an attacker. Randomness - Mathematically, it turns out that English has about 1.3 bits of information per character. Thus it takes 49 characters to get 64 bits of ”secret”, which comes out to about 10 words (at 5 characters on average per word). 2 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
  • 22. Something you know There are three dimensions2 Length - Longer passwords are better - A good way to get a long password that is seemingly random yet easy to remember - e.g. like the first words of a song and then generate the password from the first letters of the passphrase. Character set -more characters...greater the number of possible combinations of characters -so the larger the password space... require doing more work by an attacker. Randomness - Mathematically, it turns out that English has about 1.3 bits of information per character. Thus it takes 49 characters to get 64 bits of ”secret”, which comes out to about 10 words (at 5 characters on average per word). 2 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
  • 23. Something you know There are three dimensions2 Length - Longer passwords are better - A good way to get a long password that is seemingly random yet easy to remember - e.g. like the first words of a song and then generate the password from the first letters of the passphrase. Character set -more characters...greater the number of possible combinations of characters -so the larger the password space... require doing more work by an attacker. Randomness - Mathematically, it turns out that English has about 1.3 bits of information per character. Thus it takes 49 characters to get 64 bits of ”secret”, which comes out to about 10 words (at 5 characters on average per word). 2 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
  • 24. Something you know There are three dimensions2 Length - Longer passwords are better - A good way to get a long password that is seemingly random yet easy to remember - e.g. like the first words of a song and then generate the password from the first letters of the passphrase. Character set -more characters...greater the number of possible combinations of characters -so the larger the password space... require doing more work by an attacker. Randomness - Mathematically, it turns out that English has about 1.3 bits of information per character. Thus it takes 49 characters to get 64 bits of ”secret”, which comes out to about 10 words (at 5 characters on average per word). 2 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 7 / 15
  • 25. Something you know : more on ”Password” Password stored as HASH value possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored password hashes. - if matched, the attacker has learned a password. Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed. system stores both h(password + salt) and the salt for each account Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one. Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays. Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every possible value of a 12 bit salt in 1 hour. Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3 3 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
  • 26. Something you know : more on ”Password” Password stored as HASH value possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored password hashes. - if matched, the attacker has learned a password. Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed. system stores both h(password + salt) and the salt for each account Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one. Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays. Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every possible value of a 12 bit salt in 1 hour. Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3 3 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
  • 27. Something you know : more on ”Password” Password stored as HASH value possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored password hashes. - if matched, the attacker has learned a password. Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed. system stores both h(password + salt) and the salt for each account Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one. Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays. Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every possible value of a 12 bit salt in 1 hour. Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3 3 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
  • 28. Something you know : more on ”Password” Password stored as HASH value possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored password hashes. - if matched, the attacker has learned a password. Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed. system stores both h(password + salt) and the salt for each account Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one. Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays. Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every possible value of a 12 bit salt in 1 hour. Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3 3 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
  • 29. Something you know : more on ”Password” Password stored as HASH value possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored password hashes. - if matched, the attacker has learned a password. Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed. system stores both h(password + salt) and the salt for each account Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one. Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays. Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every possible value of a 12 bit salt in 1 hour. Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3 3 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
  • 30. Something you know : more on ”Password” Password stored as HASH value possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored password hashes. - if matched, the attacker has learned a password. Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed. system stores both h(password + salt) and the salt for each account Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one. Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays. Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every possible value of a 12 bit salt in 1 hour. Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3 3 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
  • 31. Something you know : more on ”Password” Password stored as HASH value possibility of offline dictionary attacks. - hash of every word in some dictionary - compares each hash with the stored password hashes. - if matched, the attacker has learned a password. Salt is a random number that is associated with a user and is added to that user’s password when the hash is computed. system stores both h(password + salt) and the salt for each account Salt does not make it more difficult for an attacker to guess the password for a given account, since the salt for each account is stored in the clear. What salt does, however, is make it harder for the attacker to perpetrate an offline dictionary attack against all users. When salt is used, all the words in the dictionary would have to be rehashed for every user. What formerly could be seen as a ”wholesale” attack has been transformed into a ”retail” one. Salt is used in most UNIX implementations. The salt in early versions of UNIX was 12 bits, and it was formed from the system time and the process identifier when an account is created. Unfortunately, 12 bits is hopelessly small, nowadays. Even an old PC can perform 13,000 crypt/sec, which means such a PC so can hash a 20k word dictionary with every possible value of a 12 bit salt in 1 hour. Point to Explore : Secret Salt, Defense Against Password Theft: A Trusted Path 3 3 https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 8 / 15
  • 32. Something you have (Something I Have) Something you have (Something I Have) e.g. Certificate, I-card, Smart Card Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 9 / 15
  • 33. Something you have (Something I Have) Something you have (Something I Have) e.g. Certificate, I-card, Smart Card Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 9 / 15
  • 34. Something you have (Something I Have) A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the card is used. Proximity card or RFID. These cards transmit stored information to a monitor via RF. Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart card transforms the authentication problem for humans, because we are no longer constrained by stringent computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks. One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id encrypts with a different key. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
  • 35. Something you have (Something I Have) A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the card is used. Proximity card or RFID. These cards transmit stored information to a monitor via RF. Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart card transforms the authentication problem for humans, because we are no longer constrained by stringent computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks. One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id encrypts with a different key. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
  • 36. Something you have (Something I Have) A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the card is used. Proximity card or RFID. These cards transmit stored information to a monitor via RF. Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart card transforms the authentication problem for humans, because we are no longer constrained by stringent computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks. One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id encrypts with a different key. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
  • 37. Something you have (Something I Have) A magnetic strip card. (eg. Cornell ID, credit card) One serious problem with these cards is that they are fairly easy to duplicate. It only costs about $50 to buy a writer, and it’s easy to get your hands on cards to copy them. To get around these problems, banks implement 2-factor authentication by requiring knowledge of a 4 to 7 character PIN whenever the card is used. Proximity card or RFID. These cards transmit stored information to a monitor via RF. Challenge/Response cards and Cryptographic Calculators. These are also called smart cards and perform some sort of cryptographic calculation. Sometimes the card will have memory, and sometimes it will have an associated PIN. A smart card transforms the authentication problem for humans, because we are no longer constrained by stringent computational and storage limitations. Unfortunately, today’s smart cards are vulnerable to power-analysis attacks. One prevalent form of smartcard is the RSA secure id. It continuously displays encrypted time; and each RSA secure id encrypts with a different key. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 10 / 15
  • 38. Something you are (Something I am) Something you are (Something I am) e.g. Certificate, I-card, Smart Card Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 11 / 15
  • 39. Something you are (Something I am) Something you are (Something I am) e.g. Certificate, I-card, Smart Card Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 11 / 15
  • 40. Something you are (Something I am) employ behavioral and physiological characteristics we might use Retinal scan, Fingerprint reader, Handprint reader, Voice print, Keystroke timing ,Signature with some agreed error rate (For example, fingerprint readers today normally exhibit error rates upwards of 5%.) Methods to subvert a fingerprint reader give some indication of the difficulties of deploying unsupervised biometric sensors as the sole means of authenticating humans. -Steal a finger -Steal a fingerprint -Replace the biometric sensor Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
  • 41. Something you are (Something I am) employ behavioral and physiological characteristics we might use Retinal scan, Fingerprint reader, Handprint reader, Voice print, Keystroke timing ,Signature with some agreed error rate (For example, fingerprint readers today normally exhibit error rates upwards of 5%.) Methods to subvert a fingerprint reader give some indication of the difficulties of deploying unsupervised biometric sensors as the sole means of authenticating humans. -Steal a finger -Steal a fingerprint -Replace the biometric sensor Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
  • 42. Something you are (Something I am) employ behavioral and physiological characteristics we might use Retinal scan, Fingerprint reader, Handprint reader, Voice print, Keystroke timing ,Signature with some agreed error rate (For example, fingerprint readers today normally exhibit error rates upwards of 5%.) Methods to subvert a fingerprint reader give some indication of the difficulties of deploying unsupervised biometric sensors as the sole means of authenticating humans. -Steal a finger -Steal a fingerprint -Replace the biometric sensor Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
  • 43. Something you are (Something I am) employ behavioral and physiological characteristics we might use Retinal scan, Fingerprint reader, Handprint reader, Voice print, Keystroke timing ,Signature with some agreed error rate (For example, fingerprint readers today normally exhibit error rates upwards of 5%.) Methods to subvert a fingerprint reader give some indication of the difficulties of deploying unsupervised biometric sensors as the sole means of authenticating humans. -Steal a finger -Steal a fingerprint -Replace the biometric sensor Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 12 / 15
  • 44. Something you are (Something I am) There are several well known problems with biometric-based authentication schemes: -Reliability of the method -Cost and availability -Unwillingness or inability to interact with biometric input devices -Compromise the biometric database or system Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 13 / 15
  • 45. Research Problem 2 Post 9/11, the United States started searching airline passengers for bombs and other potentially dangerous material. More recently, in reaction to the Madrid and London subway bombings, other governments have started searching subway customers. In all of these schemes, the cost of searching a suspect is significant and it is too costly to search every passenger. Some sort of sampling is then employed, which leads to a design choice about who gets selected for searches: Select randomly among all passengers. Select randomly among passengers satisfying certain predefined profiles. Adopt (1) and you end up searching babies, grandmothers, and congressman; adopt (2) and you might only search males of a certain age and ethnicity. Given a fixed budget for performing searches, which of (1) and (2) is likely to be more effective at decreasing the chances of successful future terrorist attacks on airplanes and/or subways. Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 14 / 15
  • 46. Authentication Protocols Different Categories of Authentication Protocols: Reciprocity of Authentication (Mutual/One Way) Type of Cryptography (Symmetric/Asymmetric) Key Exchange Computational and Communication Efficiency Real time involvement of Third Party (online vs offline) Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
  • 47. Authentication Protocols Different Categories of Authentication Protocols: Reciprocity of Authentication (Mutual/One Way) Type of Cryptography (Symmetric/Asymmetric) Key Exchange Computational and Communication Efficiency Real time involvement of Third Party (online vs offline) Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
  • 48. Authentication Protocols Different Categories of Authentication Protocols: Reciprocity of Authentication (Mutual/One Way) Type of Cryptography (Symmetric/Asymmetric) Key Exchange Computational and Communication Efficiency Real time involvement of Third Party (online vs offline) Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
  • 49. Authentication Protocols Different Categories of Authentication Protocols: Reciprocity of Authentication (Mutual/One Way) Type of Cryptography (Symmetric/Asymmetric) Key Exchange Computational and Communication Efficiency Real time involvement of Third Party (online vs offline) Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
  • 50. Authentication Protocols Different Categories of Authentication Protocols: Reciprocity of Authentication (Mutual/One Way) Type of Cryptography (Symmetric/Asymmetric) Key Exchange Computational and Communication Efficiency Real time involvement of Third Party (online vs offline) Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15
  • 51. Authentication Protocols Different Categories of Authentication Protocols: Reciprocity of Authentication (Mutual/One Way) Type of Cryptography (Symmetric/Asymmetric) Key Exchange Computational and Communication Efficiency Real time involvement of Third Party (online vs offline) Dr.Ramchandra Mangrulkar Lecture #2: Defence Strategies and Techniques: Part I August 5, 2020 15 / 15