Transcript CyberSecurity - Ian Theofilos
Access Control Terminology
Access Controls Control how users and systems communicate and interact
Process Terminology
Identification Method for determining a subject is who it says it is User name, PIN number, smart card, account number Authenticated Provided a second matching piece to the identification method Password, passphrase, PIN number Authorized Has appropriate access to the requested resource
Strong Authentication
Types of authentication Something a person has Something a person knows Something a person is Strong Authentication includes at least 2 of the 3 Only 1 is considered _______________
Biometrics – Something a Person Is
A unique personal attribute Type I Error Rejected an authorized user Type II Error Accepts a non-authorized imposter Crossover Error Rate (CER) Point where Type I Error distribution and Type II Error distribution meet The lower the number, the better
Popular Biometrics
Fingerprint Palm scan Hand Geometry Length and width of the hand and fingers Retina Scan Iris Scan Signature Dynamics Keyboard Dynamics Voice Print Facial Scan Hand Topology Side picture of the hand
Biometrics Compared
Passwords – Something a Person Knows
Passphrases refer to multiple word passwords Personal Identification Numbers (PIN) refer to numeric numbers Considered weak People use familiar words or numbers Words are susceptible to dictionary and brute force attacks Users can’t remember strong passwords so they write them down
Making Passwords Stronger
Forced password lifetimes Shorter makes it more secure, but too short and users forget which is active 60 days is good compromise Enforced minimum lengths Forced special characters, case changes No reuse Lock out users at low clipping level (acceptable failed attempts) For how long?
Better Passwords Through Technology
Password Generators Produce passwords using random but pronounceable passwords Password Checkers/Crackers L0phtcrack John the Ripper Brutus
Variations on a Theme
Cognitive Passwords Fact or opinion based information Best for seldom used authentication needs One-Time Use Passwords Synchronous token device Token and server preshare private key Time based – token device and server clock are sync’ed, time value used as plaintext Event based – token and server share authentication value list Asynchronous token device Server prompts with challenge code, user enters code into token device which returns a response code, user enters response into server
Digital Signatures
-------BEGIN SIGNATURE----- IQB1AwUBMVSiA5QYCuMfgNYjAQFAKgL/ ZkBfbeNEsbthba4BlrcnjaqbcKgNv+a5kr453 7y8RCd+RHm75yYh5xxA1ojELwNhhb7cltrp 2V7LlOnAelws4S87UX80cL BtBcN6AACf11 qymC2h+Rb2j5SSU+rmXWru+=QFMx -------END SIGNATURE------
Cards – Something a Person Has
Memory Cards Hold information only Credit cards, ATM cards Smart Cards Process information and hold information Information on card actively protected by authentication
Authorization Criteria
Roles Based on job function or assignment Groups Physical location Interactive login, for example Logical location IP address, for example Time of day Transaction type Amount of money to be transferred, for example
Restrictions to Remember
Default to NO ACCESS Access Control Lists (ACL) commonly default to deny Base granted access on Need To Know Least-privilege principal Single sign on whenever possible Scripts Kerberos is recognized standard in heterogeneous environments SESAME - Secure European System for Applications in a Multivendor Environment
Access Control Models
Discretionary Access Control (DAC) Owner (creator) can access resource and dictate who else can access it Does not lend itself to central management Mandatory Access Control (MAC) Operating system controls access based on owners sensitivity level Commonly used in military systems
Role Based Access Control (RBAC) Subjects role determines access Managed centrally Rule Based Access Control Access matched against rules Common in network devices Constrained Interfaces Limits data access and functionality ATM machines, for example Content Dependant Access Control Restrictions based on data content Firewalls commonly use this to stop worms, viruses
Access Control Matrixes
Table of subjects and objects indicating actions subjects can take upon objects Common in DAC model Capability Tables Access rights a specific subject has for a specific object ACL’s Lists of subjects that have access to a specific object Very common in networking devices, firewalls
Centralized Access Control
Remote Authentication Dial-in User Service (RADIUS) Terminal Access Controller Access Control System (TACACS)
Decentralized Access Controls
Security Domains Realm of distributed trust Hierarchical or peer implementations Microsoft domains are a specific version
Typical Scenario - Hybrid
Most enterprises combine both centralized and decentralized control methods May have Kerberos centralized user database Use TACACS+ tied to Kerberos to authenticate dial-up and router users Use Windows 2000 file servers at each location to allow autonomous distributed security domains Workgroup printers are shared via Windows desktop peering
Control Types
Preventative Avoid undesirable events Detective Identify undesirable events Corrective Fix undesirable events that have occurred Deterrent Discourage undesirable events Recovery Restore resources Compensation Provide alternatives to other types of controls
Services Provided by Various Security Controls
Fences, locks, lighting Preventative Corrective Recovery Security guard Preventative Detective Corrective Deterrent Recovery Separation of duties Preventative Deterrent Security awareness training Preventative Detective Personnel procedures Preventative Detective Deterrent Compensation
Services Provided by Various Security Controls
ACL’s Preventative Encryption Preventative Deterrent Audit logs Detective Smart cards Preventative Intrusion Detection System Preventative Detective Corrective Deterrent Antivirus Software Preventative Detective Corrective Recovery
Common Access Control Practices
Deny access to systems by anonymous & guest accounts Limit and monitor use of admin accounts Remove obsolete user accounts when employees leave company Suspend inactive accounts after 30-60 days Disable unneeded system features & services Use nondescriptive logon ID’s Rename root and administrator logon ID’s Remove redundant accounts, ACL’s, roles, groups
Fun with Auditing
Enforces accountability Must be reviewed Must be backed up and protected Good hackers always go after the audit logs Guaranteed integrity is key to using logs as evidence To be admissible in court, logs must be generated in the normal course of business
Common Audit Events
System performance Logon attempts + date/time (successful & unsuccessful) Lockouts of users Alteration of config files Error messages Files opened and closed File modifications ACL violations
Unauthorized Disclosure
Object Reuse Data left on floppies, backup tapes, or hard drives can be read Sectors containing data can be marked bad, thus hiding data Low level format, degauss, or destroy the media Emanation Security Capturing electrical and electromagnetic radiation from devices TEMPEST – US Government standard for emanation protection
Intrusion Detection Systems
Sniff network traffic (network-based) or monitor individual computers (host-based) Signature Based Detection Must be loaded with “fingerprints” of known attacks Not effective against new attacks Statistical Intrusion Detection Looks for statistical anomalies in traffic
Sniffers
Captures network traffic real-time Allows admins or hackers to eavesdrop on data Employees can use sniffers undetected in some networks
Honeypots
Unprotected system set up to lure would be attackers Attackers can then be tracked, attacks cataloged, other systems hardened appropriately Enticement Legally admissible, target is simply not well protected Entrapment Not legally admissible, target invites the hacker in
Threats to Access Control
Dictionary Attack Lists or dictionaries are used as a source of passwords or plain text Countermeasures Do not allow single word based passwords – use dictionary attacks against your own users to find weak passwords Rotate passwords often Employ one-time password techniques Protect password files and stores
Threats to Access Control
Brute Force Attack Attack attempts every possible combination of potential inputs Countermeasures Employ stringent clipping levels and auditing of login attempts Use brute force attacks against your own users to uncover weak passwords Protect password files and stores Login Spoofing Hacker replaces legitimate login screens with fakes Countermeasure
Threats to Access Control
Login Spoofing Hacker replaces legitimate login screens with fakes Countermeasure Security awareness training Display number of failed login attempts
Homework Assignment
Read Chapter 5, except: State Machine Models & Modes of Operation (pgs 240-249) Paper Write a 2 3 page technical brief on the “Slammer” worm Include vulnerable software details, countermeasures, and information about testing systems for the vulnerability.
Discuss the impact and current investigation of the worm.
Summarize the events and alerts that occurred as the weekend unfolded.