Security+ Guide to Network Security Fundamentals, Third Edition

Slides:



Advertisements
Similar presentations
Access Control Chapter 3 Part 3 Pages 209 to 227.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Understand Database Security Concepts
Access Control Methodologies
Lesson 17: Configuring Security Policies
Security+ Guide to Network Security Fundamentals, Fourth Edition
Security+ Guide to Network Security Fundamentals, Fourth Edition
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Security+ Guide to Network Security Fundamentals, Third Edition
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 10 Conducting Security Audits.
Security Awareness: Applying Practical Security in Your World
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
SE571 Security in Computing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
.  Access Control Models  Authentication Models  Logging Procedures  Conducting Security Audits  Redundancy Planning  Disaster Recovery Procedures.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Working with Workgroups and Domains
Chapter 10: Authentication Guide to Computer Network Security.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Guide to Operating System Security Chapter 4 Account-based Security.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Security Planning and Administrative Delegation Lesson 6.
Data and its manifestations. Storage and Retrieval techniques.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Breno de MedeirosFlorida State University Fall 2005 Windows servers The NT security model.
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Chapter 10: Rights, User, and Group Administration.
File System Security Robert “Bobby” Roy And Chris “Sparky” Arnold.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Lecture 5 User Authentication modified from slides of Lawrie Brown.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Understand Permissions LESSON Security Fundamentals.
SCSC 455 Computer Security Chapter 3 User Security.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Privilege Management Chapter 22.
Design Principles and Common Security Related Programming Problems
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Computer Security: Principles and Practice
11 SECURITY PLANNING AND ADMINISTRATIVE DELEGATION Chapter 6.
Chapter 14: Controlling and Monitoring Access. Comparing Access Control Models Comparing permissions, rights, and privileges Understanding authorization.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Access Control Jeff Wicklund Computer Security Fall 2013.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Understanding Security Policies Lesson 3. Objectives.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Understanding Security Policies
Access Control Model SAM-5.
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Chapter 14: System Protection
Introduction to Operating Systems
CompTIA Security+ Study Guide (SY0-401)
Lesson 16-Windows NT Security Issues
OS Access Control Mauricio Sifontes.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Module 2 OBJECTIVE 14: Compare various security mechanisms.
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals

Objectives Define access control and list the four access control models Describe logical access control methods Explain the different types of physical access control Security+ Guide to Network Security Fundamentals, Third Edition

What Is Access Control? Access control The process by which resources or services are granted or denied on a computer system or network There are four standard access control models as well as specific practices used to enforce access control Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Terminology Identification A user accessing a computer system would present credentials or identification, such as a username Authentication Checking the user’s credentials to be sure that they are authentic and not fabricated Authorization Granting permission to take the action A computer user is granted access To only certain services or applications in order to perform their duties Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Terminology (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Terminology (continued) Computer access control can be accomplished by one of three entities: hardware, software, or a policy Access control can take different forms depending on the resources that are being protected Other terminology is used to describe how computer systems impose access control: Object Subject Operation Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Terminology (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models Access control model Provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications Once an access control model is applied Custodians can configure security based on the requirements set by the owner So that end users can perform their job functions Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) Mandatory Access Control (MAC) model The end user cannot implement, modify, or transfer any controls The owner and custodian are responsible for managing access controls This is the most restrictive model because all controls are fixed In the original MAC model, all objects and subjects were assigned a numeric access level The access level of the subject had to be higher than that of the object in order for access to be granted Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) Discretionary Access Control (DAC) model The least restrictive A subject has total control over any objects that he or she owns Along with the programs that are associated with those objects In the DAC model, a subject can also change the permissions for other subjects over objects Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) DAC has two significant weaknesses It relies on the end-user subject to set the proper level of security A subject’s permissions will be “inherited” by any programs that the subject executes User Account Control (UAC) Operating systems prompt the user for permission whenever software is installed Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) Three primary security restrictions implemented by UAC: Run with limited privileges by default Applications run in standard user accounts Standard users perform common tasks Another way of controlling DAC inheritance is to automatically reduce the user’s permissions Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) Role Based Access Control (RBAC) model Sometimes called Non-Discretionary Access Control Considered a more “real world” approach than the other models Assigns permissions to particular roles in the organization, and then assigns users to that role Objects are set to be a certain type, to which subjects with that particular role have access Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) Rule Based Access Control (RBAC) model Also called the Rule-Based Role-Based Access Control (RB-RBAC) model or automated provisioning Can dynamically assign roles to subjects based on a set of rules defined by a custodian Each resource object contains a set of access properties based on the rules Rule Based Access Control is often used for managing user access to one or more systems Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Models (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Practices for Access Control Separation of duties Requires that if the fraudulent application of a process could potentially result in a breach of security Then the process should be divided between two or more individuals Job rotation Instead of one person having sole responsibility for a function, individuals are periodically moved from one job responsibility to another Security+ Guide to Network Security Fundamentals, Third Edition

Practices for Access Control (continued) Least privilege Each user should be given only the minimal amount of privileges necessary to perform his or her job function Implicit deny If a condition is not explicitly met, then it is to be rejected Security+ Guide to Network Security Fundamentals, Third Edition

Logical Access Control Methods The methods to implement access control are divided into two broad categories Physical access control and logical access control Logical access control includes access control lists (ACLs), group policies, account restrictions, and passwords Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Lists (ACLs) Access control list (ACL) A set of permissions that is attached to an object Specifies which subjects are allowed to access the object And what operations they can perform on it These lists are most often viewed in relation to files maintained by the operating system The structure behind ACL tables is a bit complex Access control entry (ACE) Each entry in the ACL table in the Microsoft Windows, Linux, and Mac OS X operating systems Security+ Guide to Network Security Fundamentals

Access Control Lists (ACLs) (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Access Control Lists (ACLs) (continued) In Windows, the ACE includes four items of information: A security identifier (SID) for the user account, group account, or logon session An access mask that specifies the access rights controlled by the ACE A flag that indicates the type of ACE A set of flags that determine whether objects can inherit permissions Security+ Guide to Network Security Fundamentals, Third Edition

Group Policies Group Policy A Microsoft Windows feature that provides centralized management and configuration of computers and remote users Using the Microsoft directory services known as Active Directory (AD) Group Policy is usually used in enterprise environments to restrict user actions that may pose a security risk Group Policy settings are stored in Group Policy Objects (GPOs) Security+ Guide to Network Security Fundamentals, Third Edition

Account Restrictions Time of day restrictions Account expiration Limit when a user can log on to a system These restrictions can be set through a Group Policy Can also be set on individual systems Account expiration The process of setting a user’s account to expire Orphaned accounts are user accounts that remain active after an employee has left an organization Can be controlled using account expiration Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Passwords Password A password should never be written down The most common logical access control Sometimes referred to as a logical token A secret combination of letters and numbers that only the user knows A password should never be written down Must also be of a sufficient length and complexity so that an attacker cannot easily guess it (password paradox) Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) Attacks on passwords Brute force attack Simply trying to guess a password through combining a random combination of characters Passwords typically are stored in an encrypted form called a “hash” Attackers try to steal the file of hashed passwords and then break the hashed passwords offline Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) Attacks on passwords (continued) Dictionary attack Begins with the attacker creating hashes of common dictionary words And compares those hashed dictionary words against those in a stolen password file Rainbow tables Make password attacks easier by creating a large pregenerated data set of hashes from nearly every possible password combination Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) Generating a rainbow table requires a significant amount of time Rainbow table advantages Can be used repeatedly for attacks on other passwords Rainbow tables are much faster than dictionary attacks The amount of memory needed on the attacking machine is greatly reduced Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) One reason for the success of rainbow tables is how older Microsoft Windows operating systems hash passwords A defense against breaking encrypted passwords with rainbow tables Hashing algorithm should include a random sequence of bits as input along with the user-created password These random bits are known as a salt Make brute force, dictionary, and rainbow table attacks much more difficult Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) Password policy A strong password policy can provide several defenses against password attacks The first password policy is to create and use strong passwords One of the best defenses against rainbow tables is to prevent the attacker from capturing the password hashes A final defense is to use another program to help keep track of passwords Security+ Guide to Network Security Fundamentals, Third Edition

Passwords (continued) Domain password policy Setting password restrictions for a Windows domain can be accomplished through the Windows Domain password policy There are six common domain password policy settings, called password setting objects Used to build a domain password policy Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Physical Access Control Physical access control primarily protects computer equipment Designed to prevent unauthorized users from gaining physical access to equipment in order to use, steal, or vandalize it Physical access control includes computer security, door security, mantraps, video surveillance, and physical access logs Security+ Guide to Network Security Fundamentals, Third Edition

Computer Security The most fundamental step in physical security is to secure the system itself Securing network servers in an organization is important Rack-mounted servers 4.45 centimeters (1.75 inches) tall Can be stacked with up to 50 other servers in a closely confined area Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Computer Security (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Door Security Hardware locks Preset lock Also known as the key-in-knob lock The easiest to use because it requires only a key for unlocking the door from the outside Automatically locks behind the person, unless it has been set to remain unlocked Security provided by a preset lock is minimal Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Hardware locks (continued) Deadbolt lock Extends a solid metal bar into the door frame for extra security Is much more difficult to defeat than preset locks Requires that the key be used to both open and lock the door Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Most organizations observe the following practices: Change locks immediately upon loss or theft of keys Inspect all locks on a regular basis Issue keys only to authorized persons Keep records of who uses and turns in keys Keep track of keys issued, with their number and identification Master keys should not have any marks identifying them as masters Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Most organizations observe the following practices: (continued) Secure unused keys in a locked safe Set up a procedure to monitor the use of all locks and keys and update the procedure as necessary When making duplicates of master keys, mark them “Do Not Duplicate,” and wipe out the manufacturer’s serial numbers to keep duplicates from being ordered Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Door access systems Cipher lock Combination locks that use buttons that must be pushed in the proper sequence to open the door Can be programmed to allow only the code of certain individuals to be valid on specific dates and times Cipher locks also keep a record of when the door was opened and by which code Cipher locks are typically connected to a networked computer system Can be monitored and controlled from one central location Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Door access systems (continued) Cipher lock disadvantages Basic models can cost several hundred dollars while advanced models can be even more expensive Users must be careful to conceal which buttons they push to avoid someone seeing or photographing the combination Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Door access systems (continued) Tailgate sensor Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway Some beams are activated and then other beams are activated a short time later Can detect if a second person walks through the beam array immediately behind (“tailgates”) the first person Without presenting credentials Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Physical tokens Objects to identify users ID badge The most common types of physical tokens ID badges originally were visually screened by security guards Today, ID badges can be fitted with tiny radio frequency identification (RFID) tags Can be read by an RFID transceiver as the user walks through the door with the badge in her pocket Security+ Guide to Network Security Fundamentals, Third Edition

Door Security (continued) Security+ Guide to Network Security Fundamentals, Third Edition

Mantraps Mantrap A security device that monitors and controls two interlocking doors to a small room (a vestibule) that separates a nonsecured area from a secured area Mantraps are used at high-security areas where only authorized persons are allowed to enter Such as sensitive data processing areas, cash handling areas, critical research labs, security control rooms, and automated airline passenger entry portals Security+ Guide to Network Security Fundamentals, Third Edition

Security+ Guide to Network Security Fundamentals, Third Edition

Video Surveillance Closed circuit television (CCTV) Using video cameras to transmit a signal to a specific and limited set of receivers Some CCTV cameras are fixed in a single position pointed at a door or a hallway Other cameras resemble a small dome and allow the security technician to move the camera 360 degrees for a full panoramic view Security+ Guide to Network Security Fundamentals, Third Edition

Physical Access Log Physical access log A record or list of individuals who entered a secure area, the time that they entered, and the time they left the area Can also identify if unauthorized personnel have accessed a secure area Physical access logs originally were paper documents Today, door access systems and physical tokens can generate electronic log documents Security+ Guide to Network Security Fundamentals, Third Edition

Summary Access control is the process by which resources or services are denied or granted Best practices for implementing access control include separation of duties, job rotation, using the principle of least privilege, and using implicit deny Logical access control methods include using access control lists (ACLs), which are provisions attached to an object Passwords, sometimes known as logical tokens, are a secret combination of letters and numbers that only the user should know Security+ Guide to Network Security Fundamentals, Third Edition

Summary (continued) Physical access control attempts to limit access to computer equipment by unauthorized users Security+ Guide to Network Security Fundamentals, Third Edition