Uploaded by Millioner jems

CHAPTER - 6 - Authentication and Access control

advertisement
Assosa University
Department of computer science
Computer security
CHAPTER 6
Authentication and Access control
Prepared By: Azeze Kafa
Email: azeze100604@gmail.com
1
2
Authentication
 Authentication is the process of verifying someone's
identity.
 Authentication technology provides access control for
systems by checking to see if a user's credentials match
the credentials in a database of authorized users or in a
data authentication server.
 Authentication assures secure systems, secure processes
and enterprise information security.
3
Types of authentication
 There are different types of authentication systems which
are: –
1. Single-Factor authentication:




User has to enter the username and the password to
confirm whether that user is logging in or not.
It is the simplest form of authentication method
Most verification today uses this type of authentication
method.
Now if the username or password is wrong, then the user
will not be allowed to log in or access the system.
Cont…
4
 Advantage of the Single-Factor Authentication
System: –




It is a very simple to use and straightforward system.
it is not at all costly.
The user does not need any huge technical skills.
The disadvantage
Authentication


of
the
Single-Factor
It is not at all password secure. It will depend on the
strength of the password entered by the user.
The protection level in Single-Factor Authentication is
much low.
5
Cont…
 There are different types of authentication systems which
are: –
1. Two-Factor authentication:
 It uses the same password/username combination, but
with the addition of being asked to verify who a
person is by using something only he or she owns,
such as a mobile device.
 Putting it simply: it uses two factors to confirm
an identity.
6
Cont…
 Two-factor authentication is designed to prevent
unauthorized users from gaining access to an account with
nothing more than a stolen password.
 Users may be at greater risk of compromised passwords
than they realize, particularly if they use the same password
on more than one website.
 Two-factor authentication is a combination of two of the
following:
Something you know (your password)
 Something you have (such as a text with a code
sent to your smartphone or other device, or a
smartphone authenticator app)
 Something you are (biometrics using your
fingerprint, face, or retina)

7
Cont…
 Multi-factor Authentication (MFA) is an
authentication method that requires the user to
provide two or more verification factors to gain
access to a resource such as an application, online
account, or a VPN.
Cont…
8
⮚ Advantages



of the Two-Factor Authentication
The Two-Factor Authentication System provides
better security than the Single-factor Authentication
system.
The productivity and flexibility increase in the twofactor authentication system.
Two-Factor Authentication prevents the loss of trust.
⮚ Disadvantages

of Two-Factor Authentication
It is time-consuming.
Cont…
9
⮚ Any
type of keylogger or phishing attack will not
be possible in a Multi-Factor Authentication
system.
⮚ The advantage of the Multi-Factor Authentication
System are: –
No risk of security.
 No information could get stolen.
 No risk of any key-logger activity.
 No risk of any data getting captured.

⮚ The
disadvantage
of
Authentication System are: –
It is time-consuming.
 It can rely on third parties.

the
Multi-Factor
Password and Passphrase
10



A password and a passphrase are both pass-codes, a
string of characters used to secure your accounts.
They both are probably made of words and mixed up
with letters and characters.
The difference is how they are built.
Password


What most people refer to as a password is typically
composed of about 10 letters, numbers or symbols, or a
combination of letter, numbers and symbols. Some
examples of passwords are: "8c?0E,*J!qI/", "yourname",
"P@55w0rd".
A password is one word, maybe two, that is intended to
confuse and misdirect hackers attempting to access your
digital resources.
Cont…
11
Passphrase



A passphrase is a password composed of a sentence or
combination of words.
Passphrases generally tend to be longer and more
complex than the average password, which increases
overall security.
A passphrase can also contain symbols, and does not
have to be a proper sentence or grammatically correct.
12
Biometrics
 Biometrics is an ancient Greek word and is the combination of
two words (bio) means life, (-metric) means measurement.
 Biometric authentication systems employ unique physical
characteristics or behavioral characteristics of an individual
person in order to authenticate the person's identity.
 Physical attributes employed in biometric authentication
systems include: Fingerprints
 Palm scan,
 hand geometry,
 Facial Scan
 Iris scan or retina patterns
 hand-written signatures,
 voice patterns.
13




Cont…
Behavioral biometrics is voice recognition, gaits,
keystroke-scan, and signature-scan
Fingerprints and handprints are the most widely used
biometric method in use today.
Many laptops include fingerprint readers and fingerprint
readers are also available on USB flash drives.
Biometric authentication systems based upon these
physical attributes have been developed for computer
login applications.
14

Cont…
Biometric authentications are widely used and have
much strength:
 Relieve user of difficult task of recalling passwords.
 Biometric is unique and is simple.
 Very difficult to replicate biometric feature.
 Biometric characteristics cannot be lost.
 Biometric is used at major places such as at airports,
immigrations purpose and at prisons.
 Fingerprint scan is small and inexpensive.
 Can be used over the phone lines.
 Eye scan are accuracy in identifying users
Fingerprints
15
⮚ The
most common biometric is finger print scanner
⮚ The fingerprint scanner identifies the image on the
user‘s finger and then matches with the data in the
database.
⮚ Every
user has different finger pattern
characteristics.
⮚ When the user‘s finger-print pattern is saved in the
database, the system covert it to into binary.
Vulnerabilities with Biometric Authentication
16
fingerprint scan is very secure since it‘s hard to
guess the fingerprint pattern.
⮚ While biometrics does provide the strongest
authentication, it is susceptible to errors.
⮚ Injury on fingers can interfere with the scanning
process
⮚ No real standard because of vendor specific
formats.
⮚A
17
Palm scan
⮚ Palm vein recognition scans the veins inside a candidate's hand
and creates a digital template representing their unique vein
pattern.
⮚ Candidates simply place a hand on the device containing the
sensor, which records the pattern of their palm veins on a digital
template.
⮚ This biometric template can be stored on a database or locally
on the device.
⮚ If the palm of the user matches the stored biometric data, the
user is authenticated.
Hand geometry
18
⮚ Hand
geometry is a biometric that identifies users
from the shape of their hands.
⮚ Hand geometry refers to the shape of the human
hand, size of the palm, and the lengths and widths
of the fingers.
⮚ Hand geometry readers measure a user's palm and
fingers along many dimensions including length,
width, deviation, and angle and compare those
measurements to measurements stored in a file.
What is a biometric face scan?
Facial Scan
19
⮚A
facial recognition system is a technology
capable of matching a human face from a digital
image or a video frame against a database of faces.
⮚ Such
a
system
is
typically
employed
to authenticate users through ID verification
services, and works by pinpointing and measuring
facial features from a given image.
Iris recognition
20
⮚ Iris
recognition systems take images of the eye using
infrared light
⮚ Iris recognition is a relatively secure biometric method of
recognizing people.
Signature Dynamics
21
⮚ Signature
recognition
is
an
example
of
behavioral biometrics that identifies a person based on
their handwriting.
⮚ It can be operated in two different ways:
⮚
Static: users write their signature on paper, and after
the writing is complete, it is digitized through an optical
scanner or a camera to turn the signature image into bits.
also known as "off-line".
⮚
Dynamic: users write their signature in a digitizing
tablet, which acquires the signature in real time.
⮚ Dynamic recognition is also known as "on-line".
22
⮚ Retinal
Retina recognition
scanning is a different, ocular-based biometric
technology that uses the unique patterns on a person's
retina blood vessels and is often confused with iris
recognition.
23
Cont…
⮚ Features of iris recognition
 Highly accurate and fast, iris recognition boasts of having top-class
precision among different types of biometric authentication
technologies.
 Remains unchanged throughout life. (This does not constitute a
guarantee.)
 Since the iris is different between the left and right eye, recognition
can be performed separately by each eye.
 Possible to distinguish twins.
 As long as the eyes are exposed, iris recognition can be used even
when the subject is wearing a hat, mask, eyeglasses or gloves.
 Because of using an infrared camera, recognition is available even at
night or in the dark.
 Without the need to touch the device, contactless authentication is
possible, making it hygienic to use.
24
⮚ Voice
Voice recognition
recognition is one part of an application that allows
a device to recognize spoken words by digitizing words
and matching digital signals with a particular pattern
stored in a device.
⮚ Biometric Voice Recognition is the use of the human
voice to uniquely identify biological characteristics to
authenticate an individual unlike passwords or tokens that
require physical input.
⮚ Voice recognition (also called speaker recognition or
voice authentication, speaker recognition, voice printing)
applies analyzes of a person's voice to verify their
identity.
25
⮚ An
AAA server
AAA server is a server program that handles user
requests for access to computer resources and, for an
enterprise, provides authentication, authorization and
accounting (AAA) services.
⮚ Authentication is the process of identifying an individual,
usually based on a username and password.
⮚ Authorization is the process of granting or denying a user
access to network resources once the user has been
authenticated through the username and password.
⮚ Accounting is the process of keeping track of a user's
activity while accessing the network resources, including
the amount of time spent in the network, the services
accessed while there and the amount of data transferred
during the session.
⮚ Accounting data is used for trend analysis, capacity
planning, billing, auditing and cost allocation.
26
⮚ The
Cont…
AAA server typically interacts with network access
and gateway servers and with databases and directories
containing user information.
⮚ The current standard by which devices or applications
communicate with an AAA server is Remote
Authentication Dial-In User Service (RADIUS).
27
⮚ Accounting.
Retina recognition
From a security perspective, it would be nice
to be able to collect information on who is attempting to
authenticate into networks or systems, whether
authentication was successful or not, and other
information, such as the following:
⮚ the amount of time an authenticated session lasted;
⮚ the amount of data transmitted and received during an
authenticated session;
⮚ if and when a user attempts to access a higher level of
system access; and
⮚ system commands performed within the authenticated
session.
⮚ This is precisely what the accounting phase of AAA
accomplishes. It acts as a logging mechanism when
authenticating to AAA-configured systems.
The Benefits of AAA
28
⮚ Central management and control of individual
⮚ Easy to organize users into groups based on
credentials;
the level of
access to systems that is required;
⮚ A logging mechanism that is useful for troubleshooting
and cybersecurity purposes; and
⮚ A highly scalable, flexible and redundant architecture.
A smart card
29
⮚A
smart card, chip card, or integrated circuit
card (ICC or IC card) is a physical electronic
authentication device, used to control access to a resource.
⮚ A smart card is a card that stores data on a
microprocessor or memory chip instead of the magnetic
stripe found on ATM and credit cards.
⮚ A smart card is a secure microcontroller that is generally
used for generating, saving and working on cryptographic
keys.
⮚ Smart card authentication supports users with smart card
devices for the goals of authentication.
⮚ Users linked their smart card to a host device.
Cont…
30
⮚ Software
on the host computer connect with the keys
material and other secrets saved on the smart card to
authenticate the user.
⮚ Smart cards are considered a very powerful form of
authentication because cryptographic keys and other
secrets stored on the card are very well secured both
physically and logically, and are extremely difficult to
steal.
⮚ The inside of a smart card usually contains an embedded
microprocessor.
⮚ The microprocessor is under a gold contact pad on one
side of the card.
⮚ Smart cards can be used with a smart-card reader
attachment to a personal computer to authenticate a user.
Cont…
31
⮚ The








most common smart card applications are:
Credit cards
Electronic cash
Computer security systems
Wireless communication
Loyalty systems (like frequent flyer points)
Banking
Satellite TV
Government identification
Kerberos authentication
32
⮚ Kerberos
is a protocol for authenticating service
requests between trusted hosts across an untrusted
network, such as the internet.
⮚ Kerberos uses symmetric key cryptography and
requires trusted third-party authorization to verify
user identities.
⮚ Kerberos was developed for Project Athena at the
Massachusetts Institute of Technology (MIT).
⮚ The name was taken from Greek mythology;
Kerberos (Cerberus) was a three-headed dog who
guarded the gates of Hades.
Cont…
33
⮚ The
strong cryptography and third-party ticket
authorization make it much more difficult for
cybercriminals to infiltrate your network.
⮚ Kerberos support is built in to all major computer
operating systems, including Microsoft Windows, Apple
macOS, FreeBSD and Linux.
⮚ The three heads of the Kerberos protocol represent the
following:
1. The client or principal;
2. The network resource, which is the application
server that provides access to the network resource;
and
3. A key distribution center (KDC), which acts as
Kerberos' trusted third-party authentication service.
Access control basics
34
⮚ ITU-T
Recommendation X.800 defines access control as
follows:
“The prevention of unauthorized use of a resource,
including the prevention of use of a resource in an
unauthorized manner.”
⮚ RFC 2828 defines computer security as:
“Measures that implement and assure security services
in a computer system, particularly those that assure
access control service”.
Cont…
35
⮚ In
general, Access Control involves:
 Preventing unauthorized users from gaining access to
resources (deals more with authentication)
 Preventing legitimate users from accessing resources
in an unauthorized manner
 Enabling legitimate users to access resources in an
authorized manner.
Cont…
36
Cont…
37
Access control basics
38
⮚ Access
control is a security technique that regulates who
or what can view or use resources in a computing
environment.
⮚ There are two types of access control:
1.
2.
physical and
logical.
⮚ Physical access control limits access to campuses, buildings,
rooms and physical IT assets.
⮚ Logical access control limits connections to computer
networks, system files and data.
⮚ To secure a facility, organizations use electronic access control
systems that rely on user credentials, access card readers,
auditing and reports to track employee access to restricted
business locations and proprietary areas, such as data centers.
Access control basics
39
⮚ Logical
access
control
systems
perform
identification, authentication and authorization of users
and entities by evaluating required login credentials that
can
include
passwords,
personal
identification
numbers, biometric scans, security tokens or
other authentication factors.
Access control Policies
40
⮚ Access Control Policies

Discretionary Access Control (DAC)
Controls access based on the identity of the requestor (subject)
and on access rules stating what the requestor is (or is not)
allowed to do.
The owner of a resource (object) can delegate access permissions
to other users (subjects).

Mandatory Access Control (MAC)
Subjects and Objects are assigned security clearances
A subject having an equal or higher security clearance than the
object can only access the object.
A subject that has clearance to access an object cannot enable
another subject to access that object (access control decisions are
taken at the admin level; not at the subject-level)

Role-based Access Control (RBAC)
Controls access based on the roles that users (subjects) have
within the system
There are rules stating what accesses are allowed to each role.
Cont…
41
⮚ High-level requirements that specify how access is managed and who
may access information under what circumstances.
⮚ It takes the form of a document offering a high-level overview, and is
then implemented via more specific rules and procedures.
Eg.
 Password polices
 Physical Access Policy
 Remote Access Policy
 Audit Policy
 Email Policy.
 Internet Acceptable Usage Policy.
 Software Policy.
 Computer, Telephone, and Desk Use Policy.
 Removable Media Policy.
 Information Protection Policy.
 Human Resources Information Security Standards.
 Information Security Incident Management Policy.
 IT Infrastructure Policy.
 Communications and Operation Management Policy.
Access control Model
42
⮚ General access control model
 Access control matrix(ACM)
 Access control list(ACL)
 Capability list(CL)
⮚ Basic



elements of ACM
Subject: An entity capable of accessing objects, the
concept of subject equates with that of process
Object: Anything to which access is controlled
(files, programs, memory segments, …)
Access right: The way in which an object is
accessed by a subject (read, write, execute, …)
Access control Matrix (ACM)
43
⮚ In
the ACM, each subject is represented by a row and
each object as a column
⮚ ACM [s,o] lists precisely which operations subject s can
request to be carried out on object o
⮚ The draw back of this system is that the Matrix will have
many empty entries
 Another widely used approach is to use Access
Control Lists in which each object maintains a list
of access rights of subjects
 Another approach is to give each subject a
Capability List (access rights to objects) that are
digitally signed
44
Cont…
45
Cont…
Access control List (ACL)
46
⮚ ACL
can be created by splitting the access matrix column-
wise.
⮚ A list of permissions
resource (object)
associated
with
a
system
Capability List (CL)
47
⮚ Capability
lists can be created by splitting the access
matrix row-wise.
48
Download