SlideShare a Scribd company logo
1 of 54
Access Controls
CISSP Guide to Security Essentials
Chapter 2
Objectives
• Identification and Authentication
• Centralized Access Control
• Decentralized Access Control
• Access Control Attacks
• Testing Access Controls
Controlling Access
Identification and Authentication
• Identification: unproven assertion of
identity
– “My name is…”
– Userid
• Authentication: proven assertion of
identity
– Userid and password
– Userid and PIN
– Biometric
Authentication Methods
• What the user knows
– Userid and password
– Userid and PIN
• What the user has
– Smart card
– Token
• What the user is
– Biometrics (fingerprint, handwriting, voice, etc.)
How Information Systems
Authenticate Users
• Request userid and password
– Hash password
– Retrieve stored userid and hashed password
– Compare
• Make a function call to a network
based authentication service
How a User Should Treat
Userids and Passwords
• Keep a secret
• Do not share with others
• Do not leave written down
where someone else can find it
• Store in an encrypted file or vault
– Use RofoForm
How a System Stores
Userids and Passwords
• Typically stored in a database table
– Application database or authentication database
– Userid stored in plaintext
• Facilitates lookups by others
– Password stored encrypted or hashed
• If encrypted, can be retrieved under
certain conditions
– “Forgot password” function, application emails to user
• If hashed, cannot be retrieved under
any circumstance (best method)
Password Hashes
• Cain, Cracker top tab, right-click empty
space, Add to List
• LM hash is weak, no longer used in Win 7
• NT hash is stronger, but not salted
Strong Authentication
• Traditional userid + password
authentication has known weaknesses
– Easily guessed passwords
– Disclosed or shared passwords
• Stronger types of authentication
available, usually referred to as “strong
authentication”
– Token
– Certificate
– Biometrics
Two Factor Authentication
• First factor: what user knows
• Second factor: what user has
– Password token
– USB key
– Digital certificate
– Smart card
• Without the second factor, user
cannot log in
– Defeats password guessing / cracking
Biometric Authentication
• Stronger than userid + password
• Stronger than two-factor?
– Can be hacked
Biometric Authentication (cont.)
• Measures a part of user’s body
– Fingerprint
– Iris scan
– Signature
– Voice
– Etc.
Biometric Authentication (cont.)
False Accept Rate
False Reject Rate
%
Occurrence
Sensitivity
Authentication Issues
• Password quality
• Consistency of user credentials across
multiple environments
• Too many userids and passwords
• Handling password resets
• Dealing with compromised passwords
• Staff terminations
Access Control Technologies
• Centralized management of access
controls
– LDAP
• Active Directory, Microsoft's LDAP
– RADIUS
• Diameter, upgrade of RADIUS
– TACACS
• Replaced by TACACS+ and RADIUS
– Kerberos
• Uses Tickets
Single Sign-On (SSO)
• Authenticate once, access many
information systems without having to
re-authenticate into each
• Centralized session management
• Often the “holy grail” for identity
management
– Harder in practice to achieve – integration issues
Reduced Sign-On
• Like single sign-on (SSO), single
credential for many systems
• But… no inter-system session
management
• User must log into each system
separately, but they all use the same
userid and password
Weakness of SSO and RSO
• Weakness: intruder can access all
systems if password is compromised
• Best to combine with two-factor /
strong authentication
Access Control Attacks
Access Control Attacks
• Intruders will try to defeat, bypass,
or trick access controls in order
to reach their target
• Attack objectives
– Guess credentials
– Malfunction of access controls
– Bypass access controls
– Replay known good logins
– Trick people into giving up credentials
Buffer Overflow
• Cause malfunction in a way that
permits illicit access
• Send more data than application was
designed to handle properly
– “Excess” data corrupts application memory
– Execution of arbitrary code
– Malfunction
• Countermeasure: “safe” coding that
limits length of input data; filter
input data to remove unsafe characters
Script Injection
• Insertion of scripting language characters
into application input fields
– Execute script on server side
• SQL injection – obtain data from application
database
– Execute script on client side – trick user or browser
• Cross site scripting
• Cross site request forgery
• Countermeasures: strip “unsafe”
characters from input
Data Remanence
• Literally: data that remains after it has
been “deleted”
• Examples
– Deleted hard drive files
– Data in file system “slack space”
– Erased files
– Reformatted hard drive
– Discarded / lost media: USB keys, backup
tapes, CDs
• Countermeasures: improve media
physical controls
Denial of Service (DoS)
• Actions that cause target system to
fail, thereby denying service to
legitimate users
– Specially crafted input that causes application
malfunction
– Large volume of input that floods application
• Distributed Denial of Service (DDoS)
– Large volume of input from many
(hundreds, thousands) of sources
• Countermeasures: input filters, patches,
high capacity
Dumpster Diving
• Literally, going through company trash in
the hopes that sensitive printed
documents were discarded that can be
retrieved
– Personnel reports, financial records
– E-mail addresses
– Trade secrets
– Technical architecture
• Countermeasures: on-site shredding
Eavesdropping
• Interception of data transmissions
– Login credentials
– Sensitive information
• Methods
– Network sniffing
(maybe from a compromised system)
– Wireless network sniffing
• Countermeasures: encryption, stronger
encryption
Emanations
• Electromagnetic radiation that emanates
from computer equipment
– Network cabling
• More prevalent in networks with coaxial cabling
– CRT monitors
– Wi-Fi networks
• Countermeasures: shielding, twisted pair
network cable, LCD monitors, lower
power or eliminate Wi-Fi
Spoofing and Masquerading
• Specially crafted network packets that
contain forged address of origin
– TCP/IP protocol permits forged MAC and IP address
– SMTP protocol permits forged e-mail “From” address
• Countermeasures: router / firewall
configuration to drop forged packets,
judicious use of e-mail for signaling or
data transfer
Social Engineering
• Tricking people into giving out sensitive
information by making them think they
are helping someone
• Methods
– In person
– By phone
• Schemes
– Log-in, remote access, building entrance help
• Countermeasures: security awareness
training
Phishing
• Incoming, fraudulent e-mail messages
designed to give the appearance of
origin from a legitimate institution
– “Bank security breach”
– “Tax refund”
– “Irish sweepstakes”
• Tricks user into providing sensitive data via a
forged web site (common) or
return e-mail (less common)
• Countermeasure: security awareness
training
Pharming
• Redirection of traffic to a forged website
– Attack of DNS server (poison cache, other attacks)
– Attack of “hosts” file on client system
– Often, a phishing e-mail to lure user to
forged website
– Forged website has appearance of the real thing
• Countermeasures: user awareness
training, patches, better controls
Password Guessing
• Trying likely passwords to log in as a
specific user
– Common words
– Spouse / partner / pet name
– Significant dates / places
• Countermeasures: strong, complex
passwords, aggressive password policy,
lockout policy
Password Cracking
• Obtain / retrieve hashed passwords
from target
• Run password cracking program
– Runs on attacker’s system – no one will notice
• Attacker logs in to target system
using cracked passwords
• Countermeasures: frequent password
changes, controls on hashed password
files, salting hash
Malicious Code
• Viruses, worms, Trojan horses, spyware,
key logger
• Harvest data or cause system
malfunction
• Countermeasures: anti-virus, anti-
spyware, security awareness training
Access Control Concepts
Access Control Concepts
• Principles of access control
• Types of controls
• Categories of controls
Principles of Access Control
• Separation of duties
– No single individual should be allowed
to perform high-value or sensitive tasks
on their own
• Financial transactions
• Software changes
• User account creation / changes
Principles of Access Control
• Least privilege
– Persons should have access to only the
functions / data that they require to perform
their stated duties
– Server applications
• Don't run as root
– User permissions on File Servers
• Don't give access to others' files
– Workstations
• User Account Control
Principles of
Access Controls (cont.)
• Defense in depth
– Use of multiple controls to protect an asset
– Heterogeneous controls preferred
• If one type fails, the other remains
• If one type is attacked, the other remains
• Examples
– Nested firewalls
– Anti-virus on workstations, file servers,
e-mail servers
Types of Controls
• Technical
– Authentication, encryption, firewalls, anti-virus
• Physical
– Key card entry, fencing, video surveillance
• Administrative
– Policy, procedures, standards
Categories of Controls
• Detective controls
• Deterrent controls
• Preventive controls
• Corrective controls
• Recovery controls
• Compensating controls
Detective Controls
• Monitor and record specific types of
events
• Does not stop or directly influence events
– Video surveillance
– Audit logs
– Event logs
– Intrusion detection system
Deterrent Controls
• Highly visible
• Prevent offenses by
influencing choices of
would-be intruders
Deterrent Controls (cont.)
• A purely deterrent control does not
prevent or even record events
– Signs
– Guards, guard dogs (may be preventive if they
are real)
– Razor wire
Preventive Controls
• Block or control specific events
– Firewalls
– Anti-virus software
– Encryption
– Key card systems
– Bollards stop cars (as shown)
Corrective Controls
• Post-event controls to prevent recurrence
• “Corrective” refers to when it is
implemented
– Can be preventive, detective, deterrent,
administrative
• Examples (if implemented after an incident)
– Spam filter
– Anti-virus on e-mail server
– WPA Wi-Fi encryption
Recovery Controls
• Post-incident controls to recover systems
• Examples
– System restoration
– Database restoration
Compensating Controls
• Control that is introduced that compensates for
the absence or failure of a control
• “Compensating” refers to why it is implemented
– Can be detective, preventive, deterrent,
administrative
• Examples
– Daily monitoring of anti-virus console
– Monthly review of administrative logins
– Web Application Firewall used to protect buggy
application
Testing Access Controls
Testing Access Controls
• Access controls are the primary
defense that protect assets
• Testing helps to verify whether they
are working properly
• Types of tests
– Penetration tests
– Application vulnerability tests
– Code reviews
Penetration Testing
• Automatic scans to discover
vulnerabilities
– Scan TCP/IP for open ports, discover
active “listeners”
– Potential vulnerabilities in open services
– Test operating system, middleware, server,
network device features
– Missing patches
• Example tools: Nessus, Nikto, SAINT,
Superscan, Retina, ISS, Microsoft Baseline
Security Analyzer
Application Vulnerability Testing
• Discover vulnerabilities in an application
• Automated tools and manual tools
• Example vulnerabilities
– Cross-site scripting, injection flaws, malicious file
execution, broken authentication, broken session
management, information leakage, insecure use of
encryption, and many more
Audit Log Analysis
• Regular examination of audit and
event logs
• Detect unwanted events
– Attempted break-ins
– System malfunctions
– Account abuse, such as credential sharing
• Audit log protection
– Write-once media
– Centralized audit logs

More Related Content

Similar to educational content,educational content,educational content,

Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationJames Wong
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationFraboni Ec
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationLuis Goldster
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authenticationTony Nguyen
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmontscm24
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerceMentalist Akram
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
Information Security
Information SecurityInformation Security
Information Securitysonykhan3
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppttalkaton
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxAlfredObia1
 

Similar to educational content,educational content,educational content, (20)

Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Crypto passport authentication
Crypto passport authenticationCrypto passport authentication
Crypto passport authentication
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
9 - Security
9 - Security9 - Security
9 - Security
 
Securing your esi_piedmont
Securing your esi_piedmontSecuring your esi_piedmont
Securing your esi_piedmont
 
Threats
ThreatsThreats
Threats
 
Threats of Database in ECommerce
Threats of Database in ECommerceThreats of Database in ECommerce
Threats of Database in ECommerce
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Ecommerce_Ch4.pptx
Ecommerce_Ch4.pptxEcommerce_Ch4.pptx
Ecommerce_Ch4.pptx
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 

More from Olajide Kuku

projmgtlectureohhgchgcgcgchgcgcmcggchgcs.ppt
projmgtlectureohhgchgcgcgchgcgcmcggchgcs.pptprojmgtlectureohhgchgcgcgchgcgcmcggchgcs.ppt
projmgtlectureohhgchgcgcgchgcgcmcggchgcs.pptOlajide Kuku
 
Authentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaAuthentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaOlajide Kuku
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational contentOlajide Kuku
 
Educational content and educational content
Educational content and educational contentEducational content and educational content
Educational content and educational contentOlajide Kuku
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentOlajide Kuku
 
educational content, educational contented educational content
educational content, educational contented educational contenteducational content, educational contented educational content
educational content, educational contented educational contentOlajide Kuku
 
joomla.ppt educational content and topic
joomla.ppt educational content and topicjoomla.ppt educational content and topic
joomla.ppt educational content and topicOlajide Kuku
 
international_tax.ppt presentation and contgent
international_tax.ppt presentation and contgentinternational_tax.ppt presentation and contgent
international_tax.ppt presentation and contgentOlajide Kuku
 
information security presentation topics
information security presentation topicsinformation security presentation topics
information security presentation topicsOlajide Kuku
 
GSC20_Session8_Security_Laura_ISOIEC.pptx
GSC20_Session8_Security_Laura_ISOIEC.pptxGSC20_Session8_Security_Laura_ISOIEC.pptx
GSC20_Session8_Security_Laura_ISOIEC.pptxOlajide Kuku
 
[v1.0.3]-PowerBI-Interactive-Tutorial.pptx
[v1.0.3]-PowerBI-Interactive-Tutorial.pptx[v1.0.3]-PowerBI-Interactive-Tutorial.pptx
[v1.0.3]-PowerBI-Interactive-Tutorial.pptxOlajide Kuku
 

More from Olajide Kuku (11)

projmgtlectureohhgchgcgcgchgcgcmcggchgcs.ppt
projmgtlectureohhgchgcgcgchgcgcmcggchgcs.pptprojmgtlectureohhgchgcgcgchgcgcmcggchgcs.ppt
projmgtlectureohhgchgcgcgchgcgcmcggchgcs.ppt
 
Authentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthauthaAuthentication Methods authauthauthauthauthautha
Authentication Methods authauthauthauthauthautha
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational content
 
Educational content and educational content
Educational content and educational contentEducational content and educational content
Educational content and educational content
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-Content
 
educational content, educational contented educational content
educational content, educational contented educational contenteducational content, educational contented educational content
educational content, educational contented educational content
 
joomla.ppt educational content and topic
joomla.ppt educational content and topicjoomla.ppt educational content and topic
joomla.ppt educational content and topic
 
international_tax.ppt presentation and contgent
international_tax.ppt presentation and contgentinternational_tax.ppt presentation and contgent
international_tax.ppt presentation and contgent
 
information security presentation topics
information security presentation topicsinformation security presentation topics
information security presentation topics
 
GSC20_Session8_Security_Laura_ISOIEC.pptx
GSC20_Session8_Security_Laura_ISOIEC.pptxGSC20_Session8_Security_Laura_ISOIEC.pptx
GSC20_Session8_Security_Laura_ISOIEC.pptx
 
[v1.0.3]-PowerBI-Interactive-Tutorial.pptx
[v1.0.3]-PowerBI-Interactive-Tutorial.pptx[v1.0.3]-PowerBI-Interactive-Tutorial.pptx
[v1.0.3]-PowerBI-Interactive-Tutorial.pptx
 

Recently uploaded

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

educational content,educational content,educational content,

  • 1. Access Controls CISSP Guide to Security Essentials Chapter 2
  • 2. Objectives • Identification and Authentication • Centralized Access Control • Decentralized Access Control • Access Control Attacks • Testing Access Controls
  • 4. Identification and Authentication • Identification: unproven assertion of identity – “My name is…” – Userid • Authentication: proven assertion of identity – Userid and password – Userid and PIN – Biometric
  • 5. Authentication Methods • What the user knows – Userid and password – Userid and PIN • What the user has – Smart card – Token • What the user is – Biometrics (fingerprint, handwriting, voice, etc.)
  • 6. How Information Systems Authenticate Users • Request userid and password – Hash password – Retrieve stored userid and hashed password – Compare • Make a function call to a network based authentication service
  • 7. How a User Should Treat Userids and Passwords • Keep a secret • Do not share with others • Do not leave written down where someone else can find it • Store in an encrypted file or vault – Use RofoForm
  • 8. How a System Stores Userids and Passwords • Typically stored in a database table – Application database or authentication database – Userid stored in plaintext • Facilitates lookups by others – Password stored encrypted or hashed • If encrypted, can be retrieved under certain conditions – “Forgot password” function, application emails to user • If hashed, cannot be retrieved under any circumstance (best method)
  • 9. Password Hashes • Cain, Cracker top tab, right-click empty space, Add to List • LM hash is weak, no longer used in Win 7 • NT hash is stronger, but not salted
  • 10. Strong Authentication • Traditional userid + password authentication has known weaknesses – Easily guessed passwords – Disclosed or shared passwords • Stronger types of authentication available, usually referred to as “strong authentication” – Token – Certificate – Biometrics
  • 11. Two Factor Authentication • First factor: what user knows • Second factor: what user has – Password token – USB key – Digital certificate – Smart card • Without the second factor, user cannot log in – Defeats password guessing / cracking
  • 12. Biometric Authentication • Stronger than userid + password • Stronger than two-factor? – Can be hacked
  • 13. Biometric Authentication (cont.) • Measures a part of user’s body – Fingerprint – Iris scan – Signature – Voice – Etc.
  • 14. Biometric Authentication (cont.) False Accept Rate False Reject Rate % Occurrence Sensitivity
  • 15. Authentication Issues • Password quality • Consistency of user credentials across multiple environments • Too many userids and passwords • Handling password resets • Dealing with compromised passwords • Staff terminations
  • 16. Access Control Technologies • Centralized management of access controls – LDAP • Active Directory, Microsoft's LDAP – RADIUS • Diameter, upgrade of RADIUS – TACACS • Replaced by TACACS+ and RADIUS – Kerberos • Uses Tickets
  • 17. Single Sign-On (SSO) • Authenticate once, access many information systems without having to re-authenticate into each • Centralized session management • Often the “holy grail” for identity management – Harder in practice to achieve – integration issues
  • 18. Reduced Sign-On • Like single sign-on (SSO), single credential for many systems • But… no inter-system session management • User must log into each system separately, but they all use the same userid and password
  • 19. Weakness of SSO and RSO • Weakness: intruder can access all systems if password is compromised • Best to combine with two-factor / strong authentication
  • 21. Access Control Attacks • Intruders will try to defeat, bypass, or trick access controls in order to reach their target • Attack objectives – Guess credentials – Malfunction of access controls – Bypass access controls – Replay known good logins – Trick people into giving up credentials
  • 22. Buffer Overflow • Cause malfunction in a way that permits illicit access • Send more data than application was designed to handle properly – “Excess” data corrupts application memory – Execution of arbitrary code – Malfunction • Countermeasure: “safe” coding that limits length of input data; filter input data to remove unsafe characters
  • 23. Script Injection • Insertion of scripting language characters into application input fields – Execute script on server side • SQL injection – obtain data from application database – Execute script on client side – trick user or browser • Cross site scripting • Cross site request forgery • Countermeasures: strip “unsafe” characters from input
  • 24. Data Remanence • Literally: data that remains after it has been “deleted” • Examples – Deleted hard drive files – Data in file system “slack space” – Erased files – Reformatted hard drive – Discarded / lost media: USB keys, backup tapes, CDs • Countermeasures: improve media physical controls
  • 25. Denial of Service (DoS) • Actions that cause target system to fail, thereby denying service to legitimate users – Specially crafted input that causes application malfunction – Large volume of input that floods application • Distributed Denial of Service (DDoS) – Large volume of input from many (hundreds, thousands) of sources • Countermeasures: input filters, patches, high capacity
  • 26. Dumpster Diving • Literally, going through company trash in the hopes that sensitive printed documents were discarded that can be retrieved – Personnel reports, financial records – E-mail addresses – Trade secrets – Technical architecture • Countermeasures: on-site shredding
  • 27. Eavesdropping • Interception of data transmissions – Login credentials – Sensitive information • Methods – Network sniffing (maybe from a compromised system) – Wireless network sniffing • Countermeasures: encryption, stronger encryption
  • 28. Emanations • Electromagnetic radiation that emanates from computer equipment – Network cabling • More prevalent in networks with coaxial cabling – CRT monitors – Wi-Fi networks • Countermeasures: shielding, twisted pair network cable, LCD monitors, lower power or eliminate Wi-Fi
  • 29. Spoofing and Masquerading • Specially crafted network packets that contain forged address of origin – TCP/IP protocol permits forged MAC and IP address – SMTP protocol permits forged e-mail “From” address • Countermeasures: router / firewall configuration to drop forged packets, judicious use of e-mail for signaling or data transfer
  • 30. Social Engineering • Tricking people into giving out sensitive information by making them think they are helping someone • Methods – In person – By phone • Schemes – Log-in, remote access, building entrance help • Countermeasures: security awareness training
  • 31. Phishing • Incoming, fraudulent e-mail messages designed to give the appearance of origin from a legitimate institution – “Bank security breach” – “Tax refund” – “Irish sweepstakes” • Tricks user into providing sensitive data via a forged web site (common) or return e-mail (less common) • Countermeasure: security awareness training
  • 32. Pharming • Redirection of traffic to a forged website – Attack of DNS server (poison cache, other attacks) – Attack of “hosts” file on client system – Often, a phishing e-mail to lure user to forged website – Forged website has appearance of the real thing • Countermeasures: user awareness training, patches, better controls
  • 33. Password Guessing • Trying likely passwords to log in as a specific user – Common words – Spouse / partner / pet name – Significant dates / places • Countermeasures: strong, complex passwords, aggressive password policy, lockout policy
  • 34. Password Cracking • Obtain / retrieve hashed passwords from target • Run password cracking program – Runs on attacker’s system – no one will notice • Attacker logs in to target system using cracked passwords • Countermeasures: frequent password changes, controls on hashed password files, salting hash
  • 35. Malicious Code • Viruses, worms, Trojan horses, spyware, key logger • Harvest data or cause system malfunction • Countermeasures: anti-virus, anti- spyware, security awareness training
  • 37. Access Control Concepts • Principles of access control • Types of controls • Categories of controls
  • 38. Principles of Access Control • Separation of duties – No single individual should be allowed to perform high-value or sensitive tasks on their own • Financial transactions • Software changes • User account creation / changes
  • 39. Principles of Access Control • Least privilege – Persons should have access to only the functions / data that they require to perform their stated duties – Server applications • Don't run as root – User permissions on File Servers • Don't give access to others' files – Workstations • User Account Control
  • 40. Principles of Access Controls (cont.) • Defense in depth – Use of multiple controls to protect an asset – Heterogeneous controls preferred • If one type fails, the other remains • If one type is attacked, the other remains • Examples – Nested firewalls – Anti-virus on workstations, file servers, e-mail servers
  • 41. Types of Controls • Technical – Authentication, encryption, firewalls, anti-virus • Physical – Key card entry, fencing, video surveillance • Administrative – Policy, procedures, standards
  • 42. Categories of Controls • Detective controls • Deterrent controls • Preventive controls • Corrective controls • Recovery controls • Compensating controls
  • 43. Detective Controls • Monitor and record specific types of events • Does not stop or directly influence events – Video surveillance – Audit logs – Event logs – Intrusion detection system
  • 44. Deterrent Controls • Highly visible • Prevent offenses by influencing choices of would-be intruders
  • 45. Deterrent Controls (cont.) • A purely deterrent control does not prevent or even record events – Signs – Guards, guard dogs (may be preventive if they are real) – Razor wire
  • 46. Preventive Controls • Block or control specific events – Firewalls – Anti-virus software – Encryption – Key card systems – Bollards stop cars (as shown)
  • 47. Corrective Controls • Post-event controls to prevent recurrence • “Corrective” refers to when it is implemented – Can be preventive, detective, deterrent, administrative • Examples (if implemented after an incident) – Spam filter – Anti-virus on e-mail server – WPA Wi-Fi encryption
  • 48. Recovery Controls • Post-incident controls to recover systems • Examples – System restoration – Database restoration
  • 49. Compensating Controls • Control that is introduced that compensates for the absence or failure of a control • “Compensating” refers to why it is implemented – Can be detective, preventive, deterrent, administrative • Examples – Daily monitoring of anti-virus console – Monthly review of administrative logins – Web Application Firewall used to protect buggy application
  • 51. Testing Access Controls • Access controls are the primary defense that protect assets • Testing helps to verify whether they are working properly • Types of tests – Penetration tests – Application vulnerability tests – Code reviews
  • 52. Penetration Testing • Automatic scans to discover vulnerabilities – Scan TCP/IP for open ports, discover active “listeners” – Potential vulnerabilities in open services – Test operating system, middleware, server, network device features – Missing patches • Example tools: Nessus, Nikto, SAINT, Superscan, Retina, ISS, Microsoft Baseline Security Analyzer
  • 53. Application Vulnerability Testing • Discover vulnerabilities in an application • Automated tools and manual tools • Example vulnerabilities – Cross-site scripting, injection flaws, malicious file execution, broken authentication, broken session management, information leakage, insecure use of encryption, and many more
  • 54. Audit Log Analysis • Regular examination of audit and event logs • Detect unwanted events – Attempted break-ins – System malfunctions – Account abuse, such as credential sharing • Audit log protection – Write-once media – Centralized audit logs