PRESENTED BY :KIRAN BALA Authentication and Authorization Authentication process In the authentication process, the identity of users is checked for providing access to the system. While in the authorization process, a person’s or user’s authorities are checked for accessing the resources. Authentication is done before the authorization process, whereas the authorization process is done after the authentication process. Access control Access control is done by creating user accounts and to control login process by the DBMS. So, that database access of sensitive data is possible only to those people (database users) who are allowed to access such data and to restrict access to unauthorized persons. The database system must also keep the track of all operations performed by certain user throughout the entire login time. Access Control Access control is the combination of policies and technologies that • • • • decide which authenticated users may access which resources. Security requirements, infrastructure, and other considerations lead companies to choose among the four most common access control models: Mandatory Access Control (MAC) Discretionary Access Control (DAC) Role-Based Access Control (RBAC) Privileged Access Management (PAM) Mandatory Access Control (MAC) The operating system in MAC will provide access to the user based on their identities and data. For gaining access, the user has to submit their personal information. It is very secure because the rules and restrictions are imposed by the admin and will be strictly followed. MAC settings and policy management will be established in a secure network and are limited to system administrators. MAC CONT MAC works by applying security labels to resources and individuals. These security labels consist of two elements: • Classification and clearance — MAC relies on a classification system (restricted, secret, top-secret, etc.) that describes a resource’s sensitivity. Users’ security clearances determine what kinds of resources they may access. • Compartment — A resource’s compartment describes the group of people (department, project team, etc.) allowed access. A user’s compartment defines the group or groups they participate in. Examples:: MAC originated in the military and intelligence community. Beyond the national security world, MAC implementations protect some companies’ most sensitive resources. Banks and insurers, for example, may use MAC to control access to customer account data. Adv & Disadv. Advantages of MAC • Enforceability — MAC administrators set organization-wide policies • • • that users cannot override, making enforcement easier. Compartmentalization — Security labels limit the exposure of each resource to a subset of the user base. Disadvantages of MAC Collaboration — MAC achieves security by constraining communication. Highly collaborative organizations may need a less restrictive approach. Management burden — A dedicated organizational structure must manage the creation and maintenance of security labels. Discretionary Access Control (DAC) DAC mechanisms will be controlled by user identification such as username and password. DAC is discretionary because the owners can transfer objects or any authenticated information to other users. In simple words, the owner can determine the access privileges. Attributes of DAC – 1. Users can transfer their object ownership to another user. 2. The access type of other users can be determined by the user. 3. Authorization failure can restrict the user access after several failed attempts. 4. Unauthorized users will be blind to object characteristics called file size, directory path, and file name. DAC CONT. Advantages of DAC • Conceptual simplicity — ACLs pair a user with their access privileges. As long as • • • • the user is in the table and has the appropriate privileges, they may access the resource. Responsiveness to business needs — Since policy change requests do not need to go through a security administration, decision-making is more nimble and aligned with business needs. Disadvantages of DAC Over/underprivileged users — A user can be a member of multiple, nested workgroups. Conflicting permissions may over- or under privilege the user. Limited control — Security administrators cannot easily see how resources are shared within the organization. And although viewing a resource’s ACL is straightforward, seeing one user’s privileges requires searching every ACL. Compromised security — By giving users discretion over access policies, the resulting inconsistencies and missing oversight could undermine the organization’s security posture. Role-Based Access Control (RBAC) Role-based access control grants access privileges based on the work that individual users do. A popular way of implementing “least privilege‚ policies, RBAC limits access to just the resources users need to do their jobs. Implementing RBAC requires defining the different roles within the organization and determining whether and to what degree those roles should have access to each resource. Adv & Disadv Advantages of RBAC • Flexibility — Administrators can optimize an RBAC system by assigning users to multiple roles, creating hierarchies to account for levels of responsibility, constraining privileges to reflect business rules, and defining relationships between roles. • Ease of maintenance — With well-defined roles, the day-to-day management is the routine onboarding, off-boarding, and cross-boarding of users’ roles. • Centralized, non-discretionary policies — Security professionals can set consistent RBAC policies across the organization. • Lower risk exposure — Under RBAC, users only have access to the resources their roles justify, greatly limiting potential threat vectors. Disadvantages of RBAC • Complex deployment — The web of responsibilities and relationships in larger enterprises makes defining roles so challenging. • Balancing security with simplicity — More roles and more granular roles provide greater security, but administering a system where users have dozens of overlapping roles becomes more difficult. • Layered roles and permissions — Assigning too many roles to users also increases the risk of overprivileging users. SQL INJECTION SQL injection is a technique used to extract user data by injecting web page inputs as statements through SQL commands. Basically, malicious users can use these instructions to manipulate the application’s web server. 1. SQL injection is a code injection technique that can compromise your database. 2. SQL injection is one of the most common web hacking techniques. 3. SQL injection is the injection of malicious code into SQL statements via web page input. CONT. Web servers communicate with database servers anytime they need to retrieve or store user data. SQL statements by the attacker are designed so that they can be executed while the web server is fetching content from the application server. It compromises the security of a web application. Example of SQL Injection Suppose we have an application based on student records. Any student can view only his or her own records by entering a unique and private student ID. Student id: The student enters the following in the input field: 12222345 or 1=1. Query: SELECT * from STUDENT where STUDENT-ID == 12222345 or 1 = 1 Now the malicious can use the ‘=’ operator in a clever manner to retrieve private and secure user information. Select * from User where (Username = “” or 1=1) AND (Password=”” or 1=1). Since 1=1 always holds true, user data is compromised. Impact of SQL Injection The hacker can retrieve all the user data present in the database such as user details, credit card information, and social security numbers, and can also gain access to protected areas like the administrator portal. It is also possible to delete user data from the tables. Nowadays, all online shopping applications and bank transactions use back-end database servers. So in case the hacker is able to exploit SQL injection, the entire server is compromised. Preventing SQL Injection • User Authentication: Validating input from the user by pre-defining length, type of input, of the input field and authenticating the user. • Restricting access privileges of users and defining how much amount of data any outsider can access from the database. Basically, users should not be granted permission to access everything in the database. • Do not use system administrator accounts INTRUSION DETECTION It is software that checks a network or system for malicious activities or policy violations. Each illegal activity or violation is often recorded The intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of distinguishing between ‘bad connections’ (intrusion/attacks) and ‘good (normal) connections’. How does an IDS work? • An IDS (Intrusion Detection System) monitors the traffic on a computer • • • • network to detect any suspicious activity. It analyzes the data flowing through the network to look for patterns and signs of abnormal behavior. The IDS compares the network activity to a set of predefined rules and patterns to identify any activity that might indicate an attack or intrusion. If the IDS detects something that matches one of these rules or patterns, it sends an alert to the system administrator. The system administrator can then investigate the alert and take action to prevent any damage or further intrusion. System IDS are classified into 5 types: • Network Intrusion Detection System (NIDS): Network intrusion detection systems (NIDS) are set up at a planned point within the network to examine traffic from all devices on the network. It performs an observation of passing traffic on the entire subnet and matches the traffic that is passed on the subnets to the collection of known attacks. Once an attack is identified or abnormal behavior is observed, the alert can be sent to the administrator. An example of a NIDS is installing it on the subnet where firewalls are located in order to see if someone is trying to crack the firewall. CONT. Host Intrusion Detection System (HIDS): Host intrusion detection systems (HIDS) run on independent hosts or devices on the network. A HIDS monitors the incoming and outgoing packets from the device only and will alert the administrator if suspicious or malicious activity is detected. It takes a snapshot of existing system files and compares it with the previous snapshot. If the analytical system files were edited or deleted, an alert is sent to the administrator to investigate. An example of HIDS usage can be seen on mission-critical machines, which are not expected to change their layout CONT. CONT.. • Protocol-based Intrusion Detection System (PIDS): Protocol-based intrusion detection system (PIDS) comprises a system or agent that would consistently reside at the front end of a server, controlling and interpreting the protocol between a user/device and the server. It is trying to secure the web server by regularly monitoring the HTTPS protocol stream and accepting the related HTTP protocol. As HTTPS is unencrypted and before instantly entering its web presentation layer then this system would need to reside in this interface, between to use the HTTPS. • Application Protocol-based Intrusion Detection System (APIDS): An application Protocol-based Intrusion Detection System (APIDS) is a system or agent that generally resides within a group of servers. It identifies the intrusions by monitoring and interpreting the communication on application-specific protocols. For example, this would monitor the SQL protocol explicitly to the middleware as it transacts with the database in the web server. • Hybrid Intrusion Detection System: Hybrid intrusion detection system is made by the combination of two or more approaches to the intrusion detection system. In the hybrid intrusion detection system, the host agent or system data is combined with network information to develop a complete view of the network system. The hybrid intrusion detection system is more effective in comparison to the other intrusion detection system. Prelude is an example of Hybrid IDS. Benefits of IDS • Detects malicious activity: IDS can detect any suspicious activities and alert the system administrator before any significant damage is done. • Improves network performance: IDS can identify any performance issues on the network, which can be addressed to improve network performance. • Compliance requirements: IDS can help in meeting compliance requirements by monitoring network activity and generating reports. • Provides insights: IDS generates valuable insights into network traffic, which can be used to identify any weaknesses and improve network security. Detection Method of IDS 1. Signature-based Method: Signature-based IDS detects the attacks on the basis of the specific patterns such as the number of bytes or a number of 1s or the number of 0s in the network traffic. It also detects on the basis of the already known malicious instruction sequence that is used by the malware. The detected patterns in the IDS are known as signatures. Signature-based IDS can easily detect the attacks whose pattern (signature) already exists in the system but it is quite difficult to detect new malware attacks as their pattern (signature) is not known. 2. Anomaly-based Method: Anomaly-based IDS was introduced to detect unknown malware attacks as new malware is developed rapidly. In anomaly-based IDS there is the use of machine learning to create a trustful activity model and anything coming is compared with that model and it is declared suspicious if it is not found in the model. The machine learning-based method has a better-generalized property in comparison to signature-based IDS as these models can be trained according to the applications and hardware configurations. Conclusion: Intrusion Detection System (IDS) is a powerful tool that can help businesses in detecting and prevent unauthorized access to their network. By analyzing network traffic patterns, IDS can identify any suspicious activities and alert the system administrator. IDS can be a valuable addition to any organization’s security infrastructure, providing insights and improving network performance.