 Access Control 1 Access Control  Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine.

Slides:



Advertisements
Similar presentations
Point3r$. Password Introduction Passwords are a key part of any security system : –Work or Personal Strong passwords make your personal and work.
Advertisements

1 Identification Who are you? How do I know you are who you say you are?
Password Cracking Lesson 10. Why crack passwords?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
CMSC 414 Computer and Network Security Lecture 12 Jonathan Katz.
CS426Fall 2010/Lecture 81 Computer Security CS 426 Lecture 8 User Authentication.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 3 Passwords Principals Authenticate to systems.
Application and OS Attacks 1 Application and OS Attacks.
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Access Control 1 Access Control Access Control 2 Access Control  Two parts to access control  Authentication: Who goes there? o Determine whether access.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication.
Password Management PA Turnpike Commission
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Computer Science Lecture 2 Passwords Professor Wayne Patterson Howard University Fall 2009.
CIS 450 – Network Security Chapter 8 – Password Security.
Database Security DB0520 Authentication and password security Authentication options – strong, weak Review security environment - Sys Admin privileges.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 3 – User Authentication.
Lecture 11: Strong Passwords
David Evans CS150: Computer Science University of Virginia Computer Science Class 31: Cookie Monsters and Semi-Secure.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Passwords. Outline Objective Authentication How/Where Passwords are Used Why Password Development is Important Guidelines for Developing Passwords Summary.
Hiding Data in “Plain Sight” Computer Forensics BACS 371.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Password authentication Basic idea –User has a secret password –System checks password to authenticate user Issues –How is password stored? –How does system.
Password Security. Overview What are passwords, why are they used? Different types of attacks Bad password practices to avoid Good password practices.
Security CS Introduction to Operating Systems.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
G53SEC 1 Authentication and Identification Who? What? Where?
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Access Control Authentication: Who goes there? Determine whether access is allowed Authenticate human to machine Authenticate machine to machine Authorization:
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Access Control Authentication: Who goes there? Determine whether access is allowed Authenticate human to machine Authenticate machine to machine Authorization:
Authentication What you know? What you have? What you are?
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Password. On a Unix system without Shadow Suite, user information including passwords is stored in the /etc/passwd file. Each line in /etc/passwd is a.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Operating Systems Security
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
CSCE 201 Identification and Authentication Fall 2015.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Computer and Information Security Chapter 7 Authentication 1.
Doc.: IEEE /0899r2 Submission July2010 Dan Harkins, Aruba NetworksSlide 1 Secure PSK Authentication Date: Authors:
Chapter Six: Authentication 2013 Term 2 Access Control Two parts to access control Authentication: Are you who you say you are?  Determine whether access.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Password Cracking COEN 252 Computer Forensics. Social Engineering Perps trick Law enforcement, private investigators can ask. Look for clues: Passwords.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Information Security Access Control.
Common Methods Used to Commit Computer Crimes
Password Management Limit login attempts Encrypt your passwords
Authentication CSE 465 – Information Assurance Fall 2017 Adam Doupé
Password Cracking Lesson 10.
NET 311 Information Security
Computer and Information Security
Authentication CSE 365 – Information Assurance Fall 2018 Adam Doupé
Part II: Access Control
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Authentication CSE 365 – Information Assurance Fall 2019 Adam Doupé
Presentation transcript:

 Access Control 1 Access Control

 Access Control 2 Access Control Two parts to access control Authentication: Are you who you say you are? – Determine whether access is allowed – Authenticate human to machine – Or authenticate machine to machine Authorization: Are you allowed to do that? – Once you have access, what can you do? – Enforces limits on actions Note: “access control” often used as synonym for authorization

 Access Control 3 Are You Who You Say You Are? How to authenticate human a machine? Can be based on… – Something you know For example, a password – Something you have For example, a smartcard – Something you are For example, your fingerprint

 Access Control 4 Something You Know Passwords Lots of things act as passwords! – PIN – Social security number – Mother’s maiden name – Date of birth – Name of your pet, etc.

Part 2  Access Control 5 Trouble with Passwords “Passwords are one of the biggest practical problems facing security engineers today.” “Humans are incapable of securely storing high- quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain and difficult to manage.)

Part 2  Access Control 6 Why Passwords? Why is “something you know” more popular than “something you have” and “something you are”? Cost: passwords are free Convenience: easier for admin to reset pwd than to issue a new thumb

Part 2  Access Control 7 Keys vs Passwords Crypto keys key is 64 bits Then 2 64 keys Choose key at random… …then attacker must try about 2 63 keys Passwords passwords are 8 characters, and 256 different characters Then = 2 64 pwds Users do not select passwords at random Attacker has far less than 2 63 pwds to try (dictionary attack)

Part 2  Access Control 8 Good and Bad Passwords Bad passwords – frank – Fido – myname – password – 4444 – Asdf1234 – – AustinStamp – Good Passwords? – jfIej,43j-EmmL+y – – P0kem0N – FSa7Yago – 0nceuP0nAt1m8 – PokeGCTall150 –

Part 2  Access Control 9 Password Experiment Three groups of users  each group advised to select passwords as follows – Group A: At least 6 chars, 1 non-letter – Group B: Password based on passphrase – Group C: 8 random characters Results – Group A: About 30% of pwds easy to crack – Group B: About 10% cracked Passwords easy to remember – Group C: About 10% cracked Passwords hard to remember – winner 

Part 2  Access Control 10 Password Experiment User compliance hard to achieve In each case, 1/3rd did not comply – And about 1/3rd of those easy to crack! Assigned passwords sometimes best If passwords not assigned, best advice is… – Choose passwords based on passphrase – Use pwd cracking tool to test for weak pwds Require periodic password changes?

Part 2  Access Control 11 Attacks on Passwords Attacker could… – Target one particular account – Target any account on system – Target any account on any system – Attempt denial of service (DoS) attack Common attack path – Outsider  normal user  administrator – May only require one weak password!

Part 2  Access Control 12 Password Retry Suppose system locks after 3 bad passwords. How long should it lock? – 5 seconds – 5 minutes – Until SA restores service What are +’s and -’s of each?

Part 2  Access Control 13 Password File? Bad idea to store passwords in a file But we need to verify passwords Cryptographic solution: hash the pwd – Store y = h(password) – Can verify entered password by hashing – If Trudy obtains “password file,” she does not obtain passwords But Trudy can try a forward search – Guess x and check whether y = h(x)

Part 2  Access Control 14 Dictionary Attack Trudy pre-computes h(x) for all x in a dictionary of common passwords Suppose Trudy gets access to password file containing hashed passwords – She only needs to compare hashes to her pre- computed dictionary – After one-time work, actual attack is trivial Can we prevent this attack? Or at least make attacker’s job more difficult?

Part 2  Access Control 15 Password Cracking: Do the Math Assumptions: Pwds are 8 chars, 128 choices per character – Then = 2 56 possible passwords There is a password file with 2 10 pwds Attacker has dictionary of 2 20 common pwds Probability of 1/4 that a pwd is in dictionary Work is measured by number of hashes

Part 2  Access Control 16 Password Cracking: Case I Attack 1 password without dictionary – Must try 2 56 /2 = 2 55 on average – Like exhaustive key search

Part 2  Access Control 17 Other Password Issues Too many passwords to remember – Results in password reuse – Why is this a problem? Who suffers from bad password? – Login password vs ATM PIN Error logs may contain “almost” passwords Bugs, keystroke logging, spyware, etc.

Part 2  Access Control 18 Passwords The bottom line… Password cracking is too easy? – One weak password may break security – Users choose bad passwords – Social engineering attacks, etc. Trudy has (almost) all of the advantages All of the math favors bad guys Passwords are a BIG security problem – And will continue to be a big problem

Part 2  Access Control 19 Password Cracking Tools Popular password cracking tools – Password Crackers Password Crackers – Password Portal Password Portal – L0phtCrack and LC4 (Windows) L0phtCrack and LC4 – John the Ripper (Unix) John the Ripper Admins should use these tools to test for weak passwords since attackers will Good articles on password cracking – Passwords - Conerstone of Computer Security Passwords - Conerstone of Computer Security – Passwords revealed by sweet deal Passwords revealed by sweet deal