SlideShare a Scribd company logo
1 of 15
ISOL536 | Security Architecture and Design
Dr. Justin O. Hensley
School of Computer and Information Sciences
1
Web, Cloud, and Account
Threats
Chapters 13 & 14
2
Agenda
Web threats
Cloud threats
Account threats
Web Threats
The web is software like other software
There are specific attack classes like Cross Site Scripting (XSS)
In much the same way that stack smashing is a “feature” of C or
other weakly typed languages
Threat modeling not needed to help find these
Finding these in TM is a distraction from the unique threats to
your software
Web Site Threats
Attack surface/Trust boundaries
Dependencies
Not showing outbound links
Is Google analytics safe? (We hope so—it’s on each page!)
Model helps you consider
each part &
relationships
Threatmodelingbook.com
Web hosting
Browser
Google Analytics
Textbook web site
DB
Browser Threats
Mostly the job of a small number of browser makers
Your job when writing a plugin
Manage security & privacy
Literature reviews & careful checking of browser API guidance
Cloud Threats
New insiders
At the cloud provider — How do they compare to other IT
outsourcing?
Co-tennants as threats
Compliance threats
Regulation: what needs to be compliant?
Audit & logging: what’s logged where and how?
Can your controls migrate?
Cloud Threats
Legal
In US, subpoena rules change if you give your data to others
(“3rd party doctrine”)
Forensic
Can you get the hard drives, etc for analysis?
Integrity
Creation and management of virtual machines
Accounts (overview)
Accounts for systems
Identity management manages accounts across many systems
Sometimes used as jargon to mean “account”
Need to create, maintain and retire accounts
Close-relationship accounts vs free accounts
Accounts that don’t map to a person
Joint bank accounts etc
Need to authenticate account-holders
Even when they lose their authenticators
The hardest problems are here
Account Create/Maintain/Delete
Mostly “normal” engineering with relatively few traps
Who can get an account?
How do you ensure information stays up to date?
What happens when the account-holder quits/leaves/passes
away?
Authentication is Hard
Traditional authentication factors
Something you know (including passwords)
Something you are (biometrics)
Something you have (Smartcard, ID card)
Something you forgot, something you were, something you lost
Multi-factor/Additional factors
Originally meant more than one from the list above
Several things you know are not “multi-factor”
Someone you know
Elements like IP address, client fingerprinting
Managing Authentication is Hard
Spoofing a Client
Note to instructor: there are random white boxes on the slide
where I re-arranged figure 14-2
12
Login Failures
“Incorrect username or password”
Comes from a time that identifying accounts was thought to be
hard
Past its prime; usability win from telling people which was
wrong outweighs risk
Account lockout
Threats to Passwords
Unintentional small disclosure
Post-its, wikis, phishing
Online attacks against the login system
Offline attacks against a stolen database
Good design can win you some time
Modern password attacks are fast: O(1 billion/sec)
Salting and iteration is better than not
If your password is ‘123456’ the salting won’t help
Practical iteration counts from 1000-1000000 barely help
Account Recovery is Hard
“Forgot your password?” there’s many ways to get back into
account
Most are substantially less secure than a half-decent password
Most are always accessible to attackers
Goal: account access, not password recovery!
Who cares about the old password?
Password recovery implies cleartext storage
Many technical choices
Email, social authentication, knowledge based (secret questions,
public records, etc)
Email Alternate Authentication
Email a new password or access token
“Obviously” you can’t mail them old password
Threats
Information disclosure (eavesdroppping, attacker access to
email)
Denial of service (customer no longer has access to the email)
Knowledge Based Authentication (KBA)
“What’s your password” is one end of the spectrum
Ideally, known only to you and customer
Unfortunately, often shared or forgotten
Leading to
Secret Questions
Public records (aka “out of wallet”)
Data only you should know (“Tell us how much we just
deposited into your account.”)
Issues with KBA
Security
“What color are your eyes” has few answers
Names are differently popular (Mike vs Lawrence)
Mothers maiden names on genealogy websites
Et Cetera
Usability
Applicability – not everyone has a first pet
Memorability (was Ms Robinson 1st or 2nd grade?)
Repeatability (Main Street vs Main St)
Social Authentication
Passive: Identify these pictures of your friends
Easy for you, hard for an attacker (we hope)
Threats: friends with pictures of their pets, pictures with name
badges
Active
Account trustees can help you get back in
Takes longer
You may no longer trust your trustees
Names
Get tricky for computers
Which Tom Jones?
“mom”
Real names don’t help you with security
People are still jerks
Policing risks offense
Secure, human meaningful, decentralized: pick two
Meaningful ID
Calls to mind the right person for the user
Requires knowing the person
The person that “mom” calls to mind is different for each us us,
and that’s ok
Must be presented in a way that’s hard to spoof
ID documents are opposite of meaningful ID
Social Security Numbers
Used as identifiers and authenticators
This is an awful pattern
An authenticator known to many parties and not subject to
change is a bad pattern
Bad as a database key
Not everyone has one
These problems generalize to other identification schemes
Identity Theft
Often just another name for fraud by an impersonator
Sometimes much worse
Database records intermingled and confused
“The computer is always right”
Reputational damage
Be careful linking data from various sources
Be careful when you correct data not to allow another source to
override it
If Alice proves she’s not malicious, don’t mark her as such
based on the previous (bad) source
Summary
To threat model web sites, focus on dependencies and unique
functionality
Cloud: focus on trust boundaries
Accounts:
“Backup” auth is just another way into an account
Social authentication is probably strongest when it meets
business goals
Names, SSNs are harder than you think
Chapter 14 ■ Accounts and Identity 261
c14.indd 07:52:38:AM 01/15/2014 Page 261
Spoof Client
Obtain
credentials
Transit
Change
management
Storage
At server
At KDC
Authentication
UI
Insufficient
authentication
Local login Null creds
Guest/anon
creds
Predictable
creds
Factory default
creds
Downgrade
authentication
Privileged
access
Remote spoof
At 3rd party
At client
Federation
issues
Backup
authentication
Knowledge based
authentication
(KBA)
Chained
authentication
Information
disclosure
(e-mail)
No
authentication
Other
authentication
attack
Figure 14-2: Spoofing an external entity threat tree
Let’s fi rst consider spoofi ng threats at the server, whether you
describe the
threat as threats of the server being spoofed or of the server
spoofi ng; it’s six
of one, half a dozen of the other. The key is that the client is,
for whatever
reason, confused about the identity of the server it’s talking to.
As discussed
previously, the key to mitigating these threats is mutual
authentication, and in
particular cryptographic authentication. If you’re implementing
a new login
Chapter 14 ■ Accounts and Identity 261
c14.indd 07:52:38:AM 01/15/2014 Page 261
Spoof Client
Obtain
credentials
Transit
Change
management
Storage
At server
At KDC
Authentication
UI
Insufficient
authentication
Local login Null creds
Guest/anon
creds
Predictable
creds
Factory default
creds
Downgrade
authentication
Privileged
access
Remote spoof
At 3rd party
At client
Federation
issues
Backup
authentication
Knowledge based
authentication
(KBA)
Chained
authentication
Information
disclosure
(e-mail)
No
authentication
Other
authentication
attack
Figure 14-2: Spoofing an external entity threat tree
Let’s fi rst consider spoofi ng threats at the server, whether you
describe the
threat as threats of the server being spoofed or of the server
spoofi ng; it’s six
of one, half a dozen of the other. The key is that the client is,
for whatever
reason, confused about the identity of the server it’s talking to.
As discussed
previously, the key to mitigating these threats is mutual
authentication, and in
particular cryptographic authentication. If you’re implementing
a new login

More Related Content

Similar to ISOL536 Security Architecture and DesignDr. Justin O. .docx

CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnottsJohn Staveley
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thsamirapdcosden
 
DevSecOps: Securing Applications with DevOps
DevSecOps: Securing Applications with DevOpsDevSecOps: Securing Applications with DevOps
DevSecOps: Securing Applications with DevOpsWouter de Kort
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptDiveshK4
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information SecurityWorldTrade3
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Brian Gongol
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsPrecisely
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptxRajuSingh730938
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxBilmyRikas
 

Similar to ISOL536 Security Architecture and DesignDr. Justin O. .docx (20)

CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe thChapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
DevSecOps: Securing Applications with DevOps
DevSecOps: Securing Applications with DevOpsDevSecOps: Securing Applications with DevOps
DevSecOps: Securing Applications with DevOps
 
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.pptUserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
 
End User Security Awareness - Information Security
End User Security Awareness - Information SecurityEnd User Security Awareness - Information Security
End User Security Awareness - Information Security
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Security
SecuritySecurity
Security
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06Hack attack: Computer safety 101 for water utilities - v.06
Hack attack: Computer safety 101 for water utilities - v.06
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
 
Unit-I PPT.pptx
Unit-I PPT.pptxUnit-I PPT.pptx
Unit-I PPT.pptx
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Awareness Security 123.pptx
Awareness Security 123.pptxAwareness Security 123.pptx
Awareness Security 123.pptx
 
USG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptxUSG_Security_Awareness_Primer.pptx
USG_Security_Awareness_Primer.pptx
 

More from vrickens

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docxvrickens
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docxvrickens
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docxvrickens
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docxvrickens
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docxvrickens
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docxvrickens
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docxvrickens
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docxvrickens
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docxvrickens
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docxvrickens
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docxvrickens
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docxvrickens
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docxvrickens
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docxvrickens
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docxvrickens
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docxvrickens
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docxvrickens
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docxvrickens
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docxvrickens
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docxvrickens
 

More from vrickens (20)

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

ISOL536 Security Architecture and DesignDr. Justin O. .docx

  • 1. ISOL536 | Security Architecture and Design Dr. Justin O. Hensley School of Computer and Information Sciences 1 Web, Cloud, and Account Threats Chapters 13 & 14 2 Agenda Web threats Cloud threats Account threats Web Threats
  • 2. The web is software like other software There are specific attack classes like Cross Site Scripting (XSS) In much the same way that stack smashing is a “feature” of C or other weakly typed languages Threat modeling not needed to help find these Finding these in TM is a distraction from the unique threats to your software Web Site Threats Attack surface/Trust boundaries Dependencies Not showing outbound links Is Google analytics safe? (We hope so—it’s on each page!) Model helps you consider each part & relationships Threatmodelingbook.com Web hosting Browser Google Analytics Textbook web site DB Browser Threats Mostly the job of a small number of browser makers Your job when writing a plugin Manage security & privacy Literature reviews & careful checking of browser API guidance
  • 3. Cloud Threats New insiders At the cloud provider — How do they compare to other IT outsourcing? Co-tennants as threats Compliance threats Regulation: what needs to be compliant? Audit & logging: what’s logged where and how? Can your controls migrate? Cloud Threats Legal In US, subpoena rules change if you give your data to others (“3rd party doctrine”) Forensic Can you get the hard drives, etc for analysis? Integrity Creation and management of virtual machines
  • 4. Accounts (overview) Accounts for systems Identity management manages accounts across many systems Sometimes used as jargon to mean “account” Need to create, maintain and retire accounts Close-relationship accounts vs free accounts Accounts that don’t map to a person Joint bank accounts etc Need to authenticate account-holders Even when they lose their authenticators The hardest problems are here Account Create/Maintain/Delete Mostly “normal” engineering with relatively few traps Who can get an account? How do you ensure information stays up to date? What happens when the account-holder quits/leaves/passes away? Authentication is Hard Traditional authentication factors Something you know (including passwords) Something you are (biometrics) Something you have (Smartcard, ID card) Something you forgot, something you were, something you lost Multi-factor/Additional factors
  • 5. Originally meant more than one from the list above Several things you know are not “multi-factor” Someone you know Elements like IP address, client fingerprinting Managing Authentication is Hard Spoofing a Client Note to instructor: there are random white boxes on the slide where I re-arranged figure 14-2 12 Login Failures “Incorrect username or password” Comes from a time that identifying accounts was thought to be hard Past its prime; usability win from telling people which was wrong outweighs risk Account lockout
  • 6. Threats to Passwords Unintentional small disclosure Post-its, wikis, phishing Online attacks against the login system Offline attacks against a stolen database Good design can win you some time Modern password attacks are fast: O(1 billion/sec) Salting and iteration is better than not If your password is ‘123456’ the salting won’t help Practical iteration counts from 1000-1000000 barely help Account Recovery is Hard “Forgot your password?” there’s many ways to get back into account Most are substantially less secure than a half-decent password Most are always accessible to attackers Goal: account access, not password recovery! Who cares about the old password? Password recovery implies cleartext storage Many technical choices Email, social authentication, knowledge based (secret questions, public records, etc) Email Alternate Authentication
  • 7. Email a new password or access token “Obviously” you can’t mail them old password Threats Information disclosure (eavesdroppping, attacker access to email) Denial of service (customer no longer has access to the email) Knowledge Based Authentication (KBA) “What’s your password” is one end of the spectrum Ideally, known only to you and customer Unfortunately, often shared or forgotten Leading to Secret Questions Public records (aka “out of wallet”) Data only you should know (“Tell us how much we just deposited into your account.”) Issues with KBA Security “What color are your eyes” has few answers Names are differently popular (Mike vs Lawrence) Mothers maiden names on genealogy websites Et Cetera Usability Applicability – not everyone has a first pet Memorability (was Ms Robinson 1st or 2nd grade?) Repeatability (Main Street vs Main St)
  • 8. Social Authentication Passive: Identify these pictures of your friends Easy for you, hard for an attacker (we hope) Threats: friends with pictures of their pets, pictures with name badges Active Account trustees can help you get back in Takes longer You may no longer trust your trustees Names Get tricky for computers Which Tom Jones? “mom” Real names don’t help you with security People are still jerks Policing risks offense Secure, human meaningful, decentralized: pick two Meaningful ID Calls to mind the right person for the user Requires knowing the person
  • 9. The person that “mom” calls to mind is different for each us us, and that’s ok Must be presented in a way that’s hard to spoof ID documents are opposite of meaningful ID Social Security Numbers Used as identifiers and authenticators This is an awful pattern An authenticator known to many parties and not subject to change is a bad pattern Bad as a database key Not everyone has one These problems generalize to other identification schemes Identity Theft Often just another name for fraud by an impersonator Sometimes much worse Database records intermingled and confused “The computer is always right” Reputational damage Be careful linking data from various sources Be careful when you correct data not to allow another source to override it If Alice proves she’s not malicious, don’t mark her as such based on the previous (bad) source
  • 10. Summary To threat model web sites, focus on dependencies and unique functionality Cloud: focus on trust boundaries Accounts: “Backup” auth is just another way into an account Social authentication is probably strongest when it meets business goals Names, SSNs are harder than you think Chapter 14 ■ Accounts and Identity 261 c14.indd 07:52:38:AM 01/15/2014 Page 261 Spoof Client Obtain credentials Transit Change management Storage
  • 11. At server At KDC Authentication UI Insufficient authentication Local login Null creds Guest/anon creds Predictable creds Factory default creds Downgrade authentication Privileged access Remote spoof At 3rd party At client Federation issues
  • 12. Backup authentication Knowledge based authentication (KBA) Chained authentication Information disclosure (e-mail) No authentication Other authentication attack Figure 14-2: Spoofing an external entity threat tree Let’s fi rst consider spoofi ng threats at the server, whether you describe the threat as threats of the server being spoofed or of the server spoofi ng; it’s six of one, half a dozen of the other. The key is that the client is, for whatever reason, confused about the identity of the server it’s talking to. As discussed previously, the key to mitigating these threats is mutual authentication, and in
  • 13. particular cryptographic authentication. If you’re implementing a new login Chapter 14 ■ Accounts and Identity 261 c14.indd 07:52:38:AM 01/15/2014 Page 261 Spoof Client Obtain credentials Transit Change management Storage At server At KDC Authentication UI Insufficient authentication Local login Null creds Guest/anon creds
  • 14. Predictable creds Factory default creds Downgrade authentication Privileged access Remote spoof At 3rd party At client Federation issues Backup authentication Knowledge based authentication (KBA) Chained authentication Information disclosure (e-mail)
  • 15. No authentication Other authentication attack Figure 14-2: Spoofing an external entity threat tree Let’s fi rst consider spoofi ng threats at the server, whether you describe the threat as threats of the server being spoofed or of the server spoofi ng; it’s six of one, half a dozen of the other. The key is that the client is, for whatever reason, confused about the identity of the server it’s talking to. As discussed previously, the key to mitigating these threats is mutual authentication, and in particular cryptographic authentication. If you’re implementing a new login