Data Access Control, Password Policy and Authentication Methods

advertisement
Data Access Control, Password Policy and
Authentication Methods for Online Bank
Md. Mahbubur Rahman Alam
B. Sc. (Statistics) Dhaka University
M. Sc. (Statistics, Major in Econometrics) Dhaka University
PGD(ICT)BUET
M. Sc. (ICT) BUET
Assistant Professor, BIBM, Mirpur, Dhaka.
Cell: 01556323244, Mail: alam_mr@yahoo.com Website: mralam.net
1
Call Center
Branch
Customer
Internet
Other
Bank
Mobile
POST
PSTN
Kiosk
Branch
2
ATM
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
3
Data Access Control
Data access typically refers to
Network
software and activities related
to storing, retrieving, or acting
on data housed in a database
or
other
Access
repository.
Data
simply
the
is
authorization
you
have
to
Operating
System
Application
Software
(CBS)
Data
access different data files.
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
4
Access Controls
Access Controls should provide reasonable assurance that data and
applications are protected against unauthorized modifications,
disclosure, loss or impairment. Such controls include physical
controls, such as keeping a computer in a locked room to limit
physical access, and logical controls such as security software
programs designed to prevent or detect unauthorized access to
sensitive files.
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
5
Restricting Access
 Implement Separation of duties (SOD) a preventive control.
 Establish test and production environments which are
preventive control.
 Restrict user account and Database administrator access which
is a preventive control.
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
6
Identification, Authentication and Process
Elements to restrict include:
Data access (Successful/Failed Selects)
Data Changes (Insert, Update, Delete)
System Access (Successful/Failed Logins);
User/Role/Permissions/Password changes
Privileged User Activity (All)
Schema Changes (Create/Drop/Alter Tables, Columns, Fields)
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
7
Authentication Methods
We can authenticate an identity in three ways:
Something the user knows (such as a password or personal
identification number)
Something the user has (a security token or smart card)
Something the user is (a physical characteristic, such as a
fingerprint, called a biometric).
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
8
Hand or Palm Geometry
Fingerprint Recognition
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
9
Facial Recognition
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
10
Eye Scans
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
11
USB Security Token or One Time Password
RSA Security LLC
RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
12
Login Authentication
AUTHENTICATION
Database Server
Verifies
Trusted Connection
Windows 2000
Group or User
OR
Database Server
Login Account
Windows 2000
Database
Server
Database Server
Verifies Name
and Password
Database User Accounts and Roles
Windows 2000
Group User
Windows
2000
Database Server
Verifies
Trusted Connection
Database
Server
Database Server Assigns
Logins to User Accounts
and Roles
Database
User
OR
Database Role
Database Server
Login Account
Database Server
Verifies Name
and Password
Permission Validation
2
3
1
Permissions OK;
Performs Command
Database User
Executes Command
SELECT * FROM Members
Database Server
Checks
Permissions
Permissions not OK;
Returns Error
Granting Permissions to Allow Access
User/Role
Eva
Ivan
David
public
SELECT
INSERT
UPDATE
DELETE
Denying Permissions to Prevent Access
User/Role
Eva
Ivan
David
public
SELECT
INSERT
UPDATE
DELETE
Revoking Granted and Denied Permissions
User/Role
Eva
Ivan
David
public
SELECT
INSERT
UPDATE
DELETE
Password Policy
 Use of both upper- and lower-case letters (case sensitivity)
 Inclusion of one or more numerical digits
 Inclusion of special characters, e.g. @, #, $ etc.
 Prohibition of words found in a dictionary or the user's personal
information
 Prohibition of passwords that match the format of calendar dates,
license plate numbers, telephone numbers, or other common
numbers
 Prohibition of use of company name or an abbreviation
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
19
Password Duration
Some policies require users to change passwords periodically,
e.g. every 90 or 180 days. The benefit of password expiration,
however, is debatable. Systems that implement such policies
sometimes prevent users from picking a password too close to a
previous selection.
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
20
Common Password Practice
 Never share a computer account
 Never use the same password for more than one account
 Never tell a password to anyone, including people who claim to
be from customer service or security
 Never write down a password
 Never communicate a password by telephone, e-mail or instant
messaging
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
21
Common Password Practice
 Being careful to log off before leaving a computer unattended
 Changing passwords whenever there is suspicion they may have
been compromised
 Operating system password and application passwords are
different
 Password should be alpha-numeric
 Never use online password generation tools
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
22
Password Strength
Password strength is a measure of the effectiveness of a
password in resisting guessing and brute-force attacks. In its usual
form, it estimates how many trials an attacker who does not have
direct access to the password would need, on average, to guess it
correctly. The strength of a password is a function of length,
complexity, and unpredictability.
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
23
Multi-factor Authentication (MFA)
MFA, two-factor authentication, TFA, T-FA or 2FA is an approach
to authentication which requires the presentation of two or more of
the three authentication factors: a knowledge factor ("something
only the user knows"), a possession factor ("something only the user
has"), and an inherence factor ("something only the user is"). After
presentation, each factor must be validated by the other party for
authentication to occur.
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
24
Multi-factor Authentication (MFA)
Something only the user knows (e.g., password, PIN, pattern);
Something only the user has (e.g., ATM card, smart card, mobile phone);
Something only the user is (e.g., biometric characteristic, such as a
fingerprint).
Md. Mahbubur Rahman Alam, Assistant Professor (ICT), BIBM. Mail: alam_mr@yahoo.com
25
Thank You
Questions
are
Welcome
26
Download