Access Control Terminology Access Controls Control how users and systems communicate and interact Process Terminology Identification Method for determining a subject is who it says it is User name, PIN number, smart card, account number Authenticated Provided a second matching piece to the identification method Password, passphrase, PIN number Authorized Has appropriate access to the requested resource Strong Authentication Types of authentication Something a person has Something a person knows Something a person is Strong Authentication includes at least 2 of the 3 Only 1 is considered _______________ Biometrics – Something a Person Is A unique personal attribute Type I Error Rejected an authorized user Type II Error Accepts a non-authorized imposter Crossover Error Rate (CER) Point where Type I Error distribution and Type II Error distribution meet The lower the number, the better Popular Biometrics Fingerprint Palm scan Hand Geometry Length and width of the hand and fingers Retina Scan Iris Scan Signature Dynamics Keyboard Dynamics Voice Print Facial Scan Hand Topology Side picture of the hand Biometrics Compared Passwords – Something a Person Knows Passphrases refer to multiple word passwords Personal Identification Numbers (PIN) refer to numeric numbers Considered weak People use familiar words or numbers Words are susceptible to dictionary and brute force attacks Users can’t remember strong passwords so they write them down Making Passwords Stronger Forced password lifetimes Shorter makes it more secure, but too short and users forget which is active 60 days is good compromise Enforced minimum lengths Forced special characters, case changes No reuse Lock out users at low clipping level (acceptable failed attempts) For how long? Better Passwords Through Technology Password Generators Produce passwords using random but pronounceable passwords Password Checkers/Crackers L0phtcrack John the Ripper Brutus Variations on a Theme Cognitive Passwords Fact or opinion based information Best for seldom used authentication needs One-Time Use Passwords Synchronous token device Token and server preshare private key Time based – token device and server clock are sync’ed, time value used as plaintext Event based – token and server share authentication value list Asynchronous token device Server prompts with challenge code, user enters code into token device which returns a response code, user enters response into server Digital Signatures -------BEGIN SIGNATURE-----IQB1AwUBMVSiA5QYCuMfgNYjAQFAKgL/ ZkBfbeNEsbthba4BlrcnjaqbcKgNv+a5kr453 7y8RCd+RHm75yYh5xxA1ojELwNhhb7cltrp 2V7LlOnAelws4S87UX80cL BtBcN6AACf11 qymC2h+Rb2j5SSU+rmXWru+=QFMx -------END SIGNATURE------ Cards – Something a Person Has Memory Cards Hold information only Credit cards, ATM cards Smart Cards Process information and hold information Information on card actively protected by authentication Authorization Criteria Roles Based on job function or assignment Groups Physical location Interactive login, for example Logical location IP address, for example Time of day Transaction type Amount of money to be transferred, for example Restrictions to Remember Default to NO ACCESS Access Control Lists (ACL) commonly default to deny Base granted access on Need To Know Least-privilege principal Single sign on whenever possible Scripts Kerberos is recognized standard in heterogeneous environments SESAME - Secure European System for Applications in a Multivendor Environment Access Control Models Discretionary Access Control (DAC) Owner (creator) can access resource and dictate who else can access it Does not lend itself to central management Mandatory Access Control (MAC) Operating system controls access based on owners sensitivity level Commonly used in military systems Role Based Access Control (RBAC) Subjects role determines access Managed centrally Rule Based Access Control Access matched against rules Common in network devices Constrained Interfaces Limits data access and functionality ATM machines, for example Content Dependant Access Control Restrictions based on data content Firewalls commonly use this to stop worms, viruses Access Control Matrixes Table of subjects and objects indicating actions subjects can take upon objects Common in DAC model Capability Tables Access rights a specific subject has for a specific object ACL’s Lists of subjects that have access to a specific object Very common in networking devices, firewalls Centralized Access Control Remote Authentication Dial-in User Service (RADIUS) Terminal Access Controller Access Control System (TACACS) Decentralized Access Controls Security Domains Realm of distributed trust Hierarchical or peer implementations Microsoft domains are a specific version Typical Scenario - Hybrid Most enterprises combine both centralized and decentralized control methods May have Kerberos centralized user database Use TACACS+ tied to Kerberos to authenticate dial-up and router users Use Windows 2000 file servers at each location to allow autonomous distributed security domains Workgroup printers are shared via Windows desktop peering Control Types Preventative Avoid undesirable events Detective Identify undesirable events Corrective Fix undesirable events that have occurred Deterrent Discourage undesirable events Recovery Restore resources Compensation Provide alternatives to other types of controls Services Provided by Various Security Controls Fences, locks, lighting Preventative Corrective Recovery Security guard Preventative Detective Corrective Deterrent Recovery Separation of duties Preventative Deterrent Security awareness training Preventative Detective Personnel procedures Preventative Detective Deterrent Compensation Services Provided by Various Security Controls ACL’s Preventative Encryption Preventative Deterrent Audit logs Detective Smart cards Preventative Intrusion Detection System Preventative Detective Corrective Deterrent Antivirus Software Preventative Detective Corrective Recovery Common Access Control Practices Deny access to systems by anonymous & guest accounts Limit and monitor use of admin accounts Remove obsolete user accounts when employees leave company Suspend inactive accounts after 30-60 days Disable unneeded system features & services Use nondescriptive logon ID’s Rename root and administrator logon ID’s Remove redundant accounts, ACL’s, roles, groups Fun with Auditing Enforces accountability Must be reviewed Must be backed up and protected Good hackers always go after the audit logs Guaranteed integrity is key to using logs as evidence To be admissible in court, logs must be generated in the normal course of business Common Audit Events System performance Logon attempts + date/time (successful & unsuccessful) Lockouts of users Alteration of config files Error messages Files opened and closed File modifications ACL violations Unauthorized Disclosure Object Reuse Data left on floppies, backup tapes, or hard drives can be read Sectors containing data can be marked bad, thus hiding data Low level format, degauss, or destroy the media Emanation Security Capturing electrical and electromagnetic radiation from devices TEMPEST – US Government standard for emanation protection Intrusion Detection Systems Sniff network traffic (network-based) or monitor individual computers (host-based) Signature Based Detection Must be loaded with “fingerprints” of known attacks Not effective against new attacks Statistical Intrusion Detection Looks for statistical anomalies in traffic Sniffers Captures network traffic real-time Allows admins or hackers to eavesdrop on data Employees can use sniffers undetected in some networks Honeypots Unprotected system set up to lure would be attackers Attackers can then be tracked, attacks cataloged, other systems hardened appropriately Enticement Legally admissible, target is simply not well protected Entrapment Not legally admissible, target invites the hacker in Threats to Access Control Dictionary Attack Lists or dictionaries are used as a source of passwords or plain text Countermeasures Do not allow single word based passwords – use dictionary attacks against your own users to find weak passwords Rotate passwords often Employ one-time password techniques Protect password files and stores Threats to Access Control Brute Force Attack Attack attempts every possible combination of potential inputs Countermeasures Employ stringent clipping levels and auditing of login attempts Use brute force attacks against your own users to uncover weak passwords Protect password files and stores Login Spoofing Hacker replaces legitimate login screens with fakes Countermeasure Threats to Access Control Login Spoofing Hacker replaces legitimate login screens with fakes Countermeasure Security awareness training Display number of failed login attempts Homework Assignment Read Chapter 5, except: State Machine Models & Modes of Operation (pgs 240-249) Paper Write a 2-3 page technical brief on the “Slammer” worm Include vulnerable software details, countermeasures, and information about testing systems for the vulnerability. Discuss the impact and current investigation of the worm. Summarize the events and alerts that occurred as the weekend unfolded.