Fundamentals of Information Systems Security/Access Control Systems

< Fundamentals of Information Systems Security

Access controls are security features that control how users and systems communicate and interact with other systems and resources.

Access is the flow of information between a subject and a resource.

A subject is an active entity that requests access to a resource or the data within a resource. E.g.: user, program, process etc.

An resource is an entity that contains the information. E.g.: Computer, Database, File, Program, Printer etc.

Access controls give organization the ability to control, restrict, monitor, and protect resource availability, integrity and confidentiality

Access Control Challenges

Access Control Principles

Access Control Criteria

The criteria for providing access to an object include

Access Control Practices

Security Principles

Identification Authentication and Authorization

Identification describes a method of ensuring that a subject is the entity it claims to be. E.g.: A user name or an account no.

Authentication is the method of proving the subjects identity. E.g.: Password, Passphrase, PIN

Authorization is the method of controlling the access of objects by the subject. E.g.: A user cannot delete a particular file after logging into the system

Note: There must be a three step process of Identification, Authentication and Authorization in order for a subject to access an object

Identification and Authentication

Identification Component Requirements

When issuing identification values to users or subjects, ensure that

Authentication Factors

There are 3 general factors for authenticating a subject.

Note: For a strong authentication to be in process, it must include two out of the three authentication factors- also referred to as two factor authentication.

Authentication Methods

Biometrics
Passwords
Cognitive Passwords
One-Time or Dynamic Passwords
Cryptographic Keys
Passphrase
Memory Cards
Smart Cards

Identity Management

Access Control Categories

Access controls can be implemented at various layers of a network and individual systems.

The access controls can be classified into three layers or categories, each category having different access control mechanisms that can be carried out manually or automatically.

Each category of access control has several components that fall within it, as described

Administrative

The administrative controls are defined by the top management in an organization.

Administrative Control Components

Policy and Procedures

Personnel Controls

Example: A bank teller who has to get supervisory approval to cash checks over $2000 is an example of separation of duties. For a security breach to occur, it would require collusion, which means that more than one person would need to commit fraud, and their efforts would need to be concerted. The use of separation of duties drastically reduces the probability of security breaches and fraud.

Supervisory Structure

Security-Awareness Training

Testing

Examples of Administrative Controls

Physical

Physical controls support and work with administrative and technical (logical) controls to supply the right degree of access control.

Physical Control Components

Network Segregation

Perimeter Security

Computer Controls

Work Area Separation

Data Backups

Cabling

Control Zone

Examples of Physical Control

Technical

Technical controls called logical controls are the s/w tools used to restrict subject’s access to objects. They can be core OS components, add-on security packages, applications, n/w h/w devices, protocols, encryption mechanisms, and access control metrics.

They protect the integrity and availability of resources by limiting the number of subjects that can access them and protect the confidentiality of resources by preventing disclosure to unauthorized subjects.

Technical Control Components

System Access

Network Access

Encryption and protocols

Auditing

Network Architecture

Examples of Technical Controls

Access Control Types

Each of the access control categories – administrative, physical and technical work at different levels, each at a different level of granularity and perform different functionalities based on the type.

The different types of access control are

Access Control Threats

Denial of Service(DoS/DDoS)

Overview

Types of DoS Attacks

A DoS attack can be perpetrated in a number of ways. There are five basic types of attack:

Countermeasures

Unfortunately, there are no effective ways to prevent being the victim of a DoS or DDoS attack, but there are steps you can take to reduce the likelihood that an attacker will use your computer to attack other computers:

Buffer Overflows

Overview

Buffer Overflow Techniques

Countermeasure


Spoofing/Masquerading

Overview

Countermeasures


Emanations

Overview

Countermeasure

Shoulder Surfing

Overview

Object Reuse

Overview

Countermeasures

Data Remanence

Overview

Countermeasures

Backdoor/Trapdoor

Overview

Countermeasure


Dictionary Attacks

Overview

Countermeasures

To properly protect an environment against dictionary and other password attacks, the following practices should be followed:

Bruteforce Attacks

Overview

Countermeasures

For phone brute force attacks, auditing and monitoring of this type of activity should be in place to uncover patterns that could indicate a wardialing attack:

Social Engineering

Overview

Common Social Engineering Attacks

Countermeasures

Access Control Technologies

Single Sign-On

Introduction

Advantages

Limitations

Disadvantages

Kerberos

Introduction

Kerberos Components

Kerberos Authentication Process

Weakness of Kerberos

SESAME

Introduction

Security Domain

Introduction

Thin Clients

Introduction

Access Control Models

Introduction

Discretionary Access Control

Mandatory Access Control

Non Discretionary or Role Based Access Control

DAC VS MAC VS RBAC

Model Access Control Owner Sec Policy enforced by
DAC Data Owners ACL
MAC Operating Systems Security Labels
RBAC Administrator Roles/ Functional Position

Access Control Techniques

Different access control technologies are available to support the different access control models.

Rule-Based Access Control

Constrained User Interface

Access Control Matrix

Content Dependant Access Control

Context Dependant Access Control

Access Control Administration

Access control administration can be done in two ways.

Centralized Access Control

RADIUS

TACACS

Note:RADIUS is the appropriate protocol when simplistic username/password authentication can take place and users only need an Accept or Deny for obtaining access, as in ISPs. TACACS+ is the better choice for environments that require more sophisticated authentication steps and tighter control over more complex authorization activities, as in corporate networks

Diameter

Decentralized Access Control

Access Control Monitoring(IDS/IPS)

Access Control Monitoring is a method of keeping track of who attempts to access specific network resources

The ACM system can fall into two categories: Intrusion Prevention System (IPS) and Intrusion Detection System (IDS)

Intrusion Detection Systems

Basic Concepts

Intrusion detection is the process of detecting an unauthorized use of, or attack upon, a computer, network, or a telecommunication infrastructure.

IDS are designed to aid in mitigating the damage that can be caused by hacking, or breaking into sensitive computer and network systems.

Common Components of an IDS

Common Functions of an IDS

IDS Types

IDS Technologies

Both HIDS and NIDS can employ the following technologies

Knowledge or Signature Based

  Security Humor: Attacks or viruses that have been discovered in production environments are referred to as being “in
  the wild.” Attacks and viruses that exist but have not been released are referred to as being “in the zoo.”  

Statistical Anomaly Based

Rule Based

IDS Sensors

Intrusion Prevention System

The traditional IDS only detects that something bad may be taking place and sends an alert. The goal of an IPS is to detect this activity and not allow the traffic to gain access to the target in the first place.

An IPS is a preventative and proactive technology, whereas an IDS is a detective and after-the-fact technology.

There has been a long debate on IPS and it turned out to be an extension of IDS and everything that holds for IDS also holds for IPS apart for IPS being preventative and IDS being detective. Honey Pots

Honey Pots

Access Control Assurance

Basic Concepts

Accountability is the method of tracking and logging the subject’s actions on the objects.

Auditing is an activity where the users/subjects actions on the objects are monitored in order to verify that the sensitivity policies are enforced and can be used as an investigation tool.

Advantages of Auditing

Note: A security professional should be able to access an environment and its security goals ,know what actions should be audited ,and know what is to be done with that information after it is captured – without wasting too much disk space , CPU power & staff time.

What to Audit?

Review of Audit Information

Protecting Audit Data and Log Information

This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.