Access Control Jeff Wicklund Computer Security Fall 2013.

Slides:



Advertisements
Similar presentations
C-TPAT SECURITY AWARENESS TRAINING
Advertisements

GCSE ICT Networks & Security..
Chapter 7: Physical & Environmental Security
Computer Security Computer Security is defined as:
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
Access Control Methodologies
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Security Awareness: Applying Practical Security in Your World
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Administrative Practices Outcome 1
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 10: Authentication Guide to Computer Network Security.
The Impact of Physical Security on Network Security
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Understanding Security Layers
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Systems Security
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Physical (Environmental) Security
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Introduction to Information Security
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Prevent Data Breaches and PII from Walking Out the Door Jim Farrell, Senior Vice President Products Archive Systems 9/18/2015.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Lesson 8-The Impact of Physical Security on Network Security.
Physical security By Ola Abd el-latif Abbass Hassan.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
IS3220 Information Technology Infrastructure Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Administrative Practices Outcome 1
Challenge/Response Authentication
NETW4005 COMPUTER SECURITY A
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Understanding Security Layers
Security in Networking
Security of Data  
Physical Security.
Managing the IT Function
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Access Control Jeff Wicklund Computer Security Fall 2013

Access Control  Introduction  A firm must develop a security plan for each sensitive resource within the company  Part of this security plan has to focus on access control  Companies need to plan, implement, and respond when the controls fail to provide high security

Access Control  Definition of Access Control  Access control is the policy driven control of access to systems, data and dialogues  Many ways to control access  Physical barriers  Passwords  Biometrics  The use of cryptography protection is used sometimes in access control

Access Control  Policy  Policy is the key concept of security  All security begins with the development of security policies for different devices  Ex- Network devices, door controllers  Policies coordinate and guide the implementation of devices within the company

Access Control  Three Functions of Access Control  Authentication  Process of assessing the identity of each individual claiming to have permission to use a resource within the company  The person or process requesting access is the supplicant  The person or process providing admission is the verifier  The Supplicant authenticates to the verifier by sending the credential's to the device requiring access

Access Control  Three functions of Access Control cont.  Authorization  Specific permissions that a particular authenticated user should have in order to access a device or file  Ex – Bob may have permission to read a file but not edit that file or delete it but another user named carol may not even have permission to see the file on the network

Access Control  Three functions of Access Control cont.  Auditing  Consists of collecting information about the activates of each individual in log files to review immediately or later for analysis.  Without auditing, violations of authentication and authorizations policies are likely to be uncontrolled within the company

Access Control  Authentication  Authentication is the most complex part of the three types of access controls.  To be authenticated you must show a verifier credentials that are based on one of the following  What you know (a password or a private key)  What you have (a physical key or a smart card)  Who you are (your fingerprint), or  What you do (how you specifically pronounce a passphrase)

Access Control  Passwords  At one point simple passwords were sufficient for most authentication needs  Today companies need many types of authentication technologies like  Access Cards  Tokens  Biometric Authentication  Cryptographic Authentication  The different types allow a company to choose the strength of authentication needed for the device

Access Control  Two factor Authentication  Use of two different forms used for access  Better security defense than one form of access  Multifactor Authentication  Use of more than two different forms of access control  Provides higher security defense than one and two

Access Control  Individual and Role-Based Access Control  Firms use what your role in the company to determine their access to company resources  They create these groups to cut down on individualizing each user within the firm  This lessens the number of opportunities of errors in assigning access  Easier to move users from one group to another for promotions

Access Control  Physical Access and Security  Many attacks do happen over the network but attacks do happen physically  Physical access is very important in access control for a firm in order to protect the firm  Even within the building certain areas of the firm should not be accessed by regular employees and must be secured

Access Control  Risk Analysis  Firms must analyze the weak points and high risk points within the firm  They also must determine parts of the building that need to be more secure than others

Access Control  Physical Security Perimeter  Security professionals need to worry about physical security just as much as securing the network  They must control the buildings entry points with security  There should be only one single point of entry  The buildings walls should be strong with no gaps  Buildings will have emergency exits that must be alarmed when opened to alert others of an open door along with being monitored by video surveillance

Access Control  Physical Entry Controls  All physical access must be authorized and monitored  Access authorizations should be reviewed and updated frequently  Visitors entering and exiting the building should be logged and supervised at all times while in the building wearing visitor badges

Access Control  Public Access, Delivery and loading Area’s  Highly sensitive zones in a building  Internal people should have limited access to delivery and loading areas  Delivery and pick up personal should have no access to the internal part of the building  All incoming shipments should be inspected and logged

Access Control  Securing offices, rooms, and facilities  Certain areas of a building will be especially sensitive  These areas should be given extra security  These areas should have locks with keys, access cards or other limited entry mechanisms  Secure areas should be located away from public access

Access Control  Equipment Security  Sensitive equipment should be placed in secure areas to minimize access  These areas should not be subject to damage from smoke, water supply failure, vandalism or other threats  Equipment should be positioned so that unauthorized people cannot read information on screens

Access Control  Supporting Utilities  Quality HVAC systems should be in place for highly sensitive areas  Electrical supply should be sufficient along with a UPS in the case of loss of power during an outage.  UPS only supply a short time in which a electrical generator should be in place to back up the UPS in the event of an outage

Access Control  Cabling Security  Cables should be secured in walls, underground or in conduits and away from public areas  Wiring closets also should be locked and monitored on who has access to these areas  Security of equipment off premises  This equipment must be logged when taken off the property and never left unintended

Access Control  Monitoring Equipment  Remote sensors connected to the central security center that alerts the uniformed guards if the sensor is activated  CCTV  CCTV is also used to monitor the premises to allow the security staff to view the area remotely  High image resolution is necessary to view the personal and/or intruder for prosecution in the event of wrongdoing

Access Control  CCTV cont.  Video monitoring systems should be placed strategically within the firm to cover high risk areas  Access control to doors can be intergraded together in order to give real time video footage of the point of access  CCTV systems have come a long way with image resolution and storage capacity at a lower cost

Access Control  Access Cards and Tokens  Access cards are used to gain entry to a door or a computer system by placing the card into the reader  There are different types of cards  Magnetic stripe card  Smart cards  Tokens

Access Control  Proximity Access Tokens  Contain a radio frequency id to each token  Easier to maintain than physical keys  If lost or stolen the user can be deleted from the system without replacing locks  Access control systems can be networked together to maintain easier when assigning access to certain areas of the building with centralizing it on one system

Works Cited  Benantar, Messaoud. Access Control Systems. [New York]: Springer Science Business Media, Print.  Kartalopoulos, Stamatios V. Security of Information and Communication Networks. Hoboken, NJ: Wiley, Print.  Kruegle, Herman. CCTV Surveillance: Video Practices and Technology. Oxford: Butterworth-Heinemann, Print.  Panko, Raymond R. Access Control. Boston: Pearson Learning Solutions, Print.