Access Control and Site Security (Part 1) Thursday 1/17/2008) © Abdou Illia – Spring 2008.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

UNIT 20 The ex-hacker.
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Password Cracking Lesson 10. Why crack passwords?
Access Control Chapter 3 Part 3 Pages 209 to 227.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Preparing Windows 2000 installation (Week 3, Wednesday 2/25/2006) © Abdou Illia, Spring 2006.
Access Control Methodologies
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
Cryptography and Network Security Chapter 20 Intruders
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Enforcing Concurrent Logon Policies with UserLock.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
CIS 450 – Network Security Chapter 8 – Password Security.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Security Planning and Administrative Delegation Lesson 6.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Access Control and Site Security (Part 1) January 26, 2015) © Abdou Illia – Spring 2015.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CHAPTER Creating and Managing Users and Groups. Chapter Objectives Explain the use of Local Users and Groups Tool in the Systems Tools Option to create.
Chapter 10: Rights, User, and Group Administration.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Computer Security By Duncan Hall.
Privilege Management Chapter 22.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
JMU GenCyber Boot Camp Summer, Introduction to Reconnaissance Information gathering – Social engineering – Physical break-in – Dumpster diving Scanning.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Understanding Security Policies Lesson 3. Objectives.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Understanding Security Policies
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Chapter One: Mastering the Basics of Security
Common Methods Used to Commit Computer Crimes
Configuring Windows Firewall with Advanced Security
Secure Software Confidentiality Integrity Data Security Authentication
Lesson 16-Windows NT Security Issues
Part 3.
Information Security Awareness
Access Control and Site Security (Part 1)
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Computer Security Protection in general purpose Operating Systems
G061 - Network Security.
6. Application Software Security
Access Control and Site Security
Presentation transcript:

Access Control and Site Security (Part 1) Thursday 1/17/2008) © Abdou Illia – Spring 2008

2 Learning Objectives Understand Main Security Goals Discuss Resources’ Access Control Discuss Password-Based Access Control

Security Goals

4 Break-in and Dialog attacks: Security Goal If eavesdropping, message alteration attacks are successful, in which of the following ways the victims could be affected? a)Data files stored on hard drives might be deleted b)Data files stored on hard drives might be altered c)Corporate trade secret could be stolen d)Competitors might get the victim company’s licensed info e)Users might not be able to get network services for a certain period of time f)The network might slow down Confidentiality = Main goal in implementing defense systems against eavesdropping and message alteration.

5 Malware attacks: Security Goal If virus attacks are successful, in which of the following ways the victims could be affected? a)Data files stored on hard drives might be deleted b)Data files stored on hard drives might be altered c)Corporate trade secret could be stolen d)Competitors might get the victim company’s licensed info e)Users might not be able to get network services for a certain period of time f)The network might slow down Integrity = Main goal of implementing defense systems against malware attacks.

6 DoS attack: Security Goal If a DoS attack is successful, in which of the following ways the victims could be affected? a)Data files stored on hard drives might be deleted b)Data files stored on hard drives might be altered c)Corporate trade secret could be stolen d)Competitors might get the victim company’s licensed info e)Users might not be able to get network services for a certain period of time f)The network might slow down Availability = Main goal of implementing defense systems against DoS attacks.

7 Security Goals Three main security goals: C onfidentiality of communications and proprietary information I ntegrity of corporate data A vailability of network services and resources CIA

Resources Access Control

9 Opening Question Which of the following action might be taken in order to strengthen the confidentiality of companies’ proprietary information? a)Prevent employees from accessing files not needed in their job b)Limit the number of computers each employee could use for logging onto the network c)Encrypt any communications involving passwords d)All of the above

10 What is Access Control? Access control is the policy-driven limitation of access to systems, data, and dialogs Access control prevents attackers from gaining access to systems’ resources, and stopping them if they do

11 Managing Access Control: Steps 1) Enumeration of (sensitive) resources E.g. HR databases, servers with trade secrets 2) Determination of sensitivity level for each resource E.g. mission-critical vs. non mission-critical 3) Determination of “Who should have access?” Role-Based Access Control (RBAC): Determine the roles (or categories) of users. Example: IT employees, HR employees, Salesmen, etc. List-Based Access Control (LBAC): System administrator could in some case create lists of employees (not based on roles) for general-purpose resources

12 Managing Access Control: Steps (cont.) 4) Determination of “What access rights should users have?” For each Role-Resource and/or List-Resource: See Browse/Read Read/Modify Delete … … Full Control AllowDeny 5) Implementing Access Control Use OS and other tools to configure access control Mandatory Access Control: Administrator’s settings apply Discretionary Access Control: owner of resource could share & set access rights Harden the host computers: patches, firewalls, etc. Perform security audits to test access control effectiveness

13 Managing Access Control: Steps (cont.) 6) Determine/implement general access policies Enumerate policies for each category of sensitive resources. Examples: Printers availability: M-F, 6:00 AM-8:00 PM Server computers: only administrators and server operators could logon locally Remote Access servers: Callback enabled Implement policies Perform security audits to test policies effectiveness Audit by internal employees Audit by security firm

Password-Based Access Control

15 Types of account/password Super account User can take any action on any resource Called Administrator (Windows), Supervisor (Netware), root (UNIX) Hacking the super account = ultimate prize for attackers Regular account Limited access based on setting by the admin Could gain super account status by elevating the privileges.

16 Reusable Passwords Used to repeatedly to get access to a resource on multiple occasions Bad because attacker could have time to crack it Difficult to crack by guessing remotely Usually cut off after a few attempts However, if can steal the password file, can crack passwords at leisure

17 Password Cracking With physical access or with password file in hand, attacker can use password cracking programs ProgramWindowsLinux L0phtcrack (now LC5)√ Ophcrack√ John The Ripper√√ RainbowCrack (uses lookup tables and hash functions)√√ Crack√ Cain & Abel√ Programs usually come with "dictionaries" with thousands or even millions of entries of several kinds Programs use brute-force cracking method Used by network admins to locate users with weak password, and by attackers.

18 Brute-force password cracking Dictionary cracking vs. hybrid cracking Try all possible character combinations Longer passwords take longer to crack Combining types of characters makes cracking harder Alphabetic, no case (26 possibilities) Alphabetic, case (52) Alphanumeric (letters and numbers) (62) All keyboard characters (~80)

19 Figure 2-3: Password Length Password Length In Characters 1 2 (N 2 ) 4 (N 4 ) Alphanumeric: Letters & Digits (N=62) 62 3,844 14,776,336 56,800,235, E E+17 All Keyboard Characters (N=~80) 80 6,400 40,960, E E E+19 Alphabetic, Case (N=52) 52 2,704 7,311,616 19,770,609, E E+17 Alphabetic, No Case (N=26) , ,915, E E+14 Q: Your password policy is: (a) the password must be 6 character long, (b) the password should include only decimal digits and lower case alphabetic characters. What is the maximum number of passwords the attacker would try in order to crack a password in your system?

20 Dictionary and Hybrid cracking Dictionary cracking 1 Try common words (“password”, “ouch,” etc.) There are only a few thousand of these Cracked very rapidly Hybrid cracking 2 Used when dictionary cracking fails Common word with one or few digits at end, etc. 1 Also called dictionary attack 2 Also called to as hybrid attack

21 Password Policies Good passwords At least 6 characters long Change of case not at beginning Digit (0 through 9) not at end Other keyboard characters not at end Example: triV6#ial

22 Password Policies (cont) Shared passwords Not a good policy Remove ability to learn who took actions; loses accountability Usually is not changed often or at all because of need to inform all sharers

23 Questions Q.1. ABC Inc. has a network with three users. The users have the following usernames: aillia, jwillems, vhampton. A shared-password policy implemented by the network administrator allowed the users to logon with the password abc123. Last night someone committed an attack stealing sensitive corporate information after elevating the privileges associated to the account they used to logon. Which of the following is true? (Choose all that apply) a) the audit log file could be checked to determine at what time the attacker logged in b) the audit log file could be checked to determine which user account was used in committing the attack c) the audit log file could be checked to determine who committed the attack d) all of the above. Q.2. If your answer to Q.1 above indicates that at least one of the statements is not true, explain why. ________________________________________________________________

24 Password Policies (cont) Disabling passwords that are no longer valid As soon as an employee leaves the firm, etc. As soon as contractors, consultants leave In many firms, a large percentage of all accounts are for people no longer with the firm

25 Password Policies (cont) Lost passwords Password resets: Help desk gives new password for the account Opportunities for social engineering attacks Leave changed password on answering machine

26 Reading Questions (Part 1) Answer Chapter 2 Reading Questions (Part 1) posted to the course web site.

27 Summary Questions What are the three main security goals? What security goal is jeopardized by a successful eavesdropping attack? What is the difference between Role Based Access Control and List Based Access Control? What is the difference between Mandatory Access Control and Discretionary Access Control? What is a super account? What is the difference between dictionary cracking and hybrid cracking? What is a shared password? Do you recommend shared passwords? Why?