Protection Mechanisms

Download Report

Transcript Protection Mechanisms

Protection Mechanisms
ASHRAY PATEL
Roadmap
 Access Control
 Four access control processes
 Managing access control
 Firewalls
 Scanning and Analysis tools
 Cryptography and Encryption
Access Control
 Regulates the admission of users into trusted areas of the
organization
Logical access to information
 Physical access to organizations facilities

 Maintained by means of a collection of policies,
programs to carry out those policies, and technology to
enforce policy
 Access control involves four processes:
Identification
 Authentication
 Authorization
 Accountability

Identification
 A mechanism that provides information about an
unverified entity that wants to be granted access
 ID must be a unique value that can be traced to one
and only one person within the security domain
 Elements that make ID’s unique within security
domain
First and last name
 Picture
 Department codes
 Random numbers
 Or special characters

Authentication
 Process to validating a persons purported identity
 Ensures the entity requesting access is the entity it
claims to be
 Three types of authentication mechanisms:



Knowledge factors: Something the user knows
Ownership factors: Something the user has
Inherence factors: Something the user is or does
 Some places require strong authentication- usually
require 2 different types of authentication
mechanisms
Knowledge Factor Methods
 Username/Password is the most common in work




places and schools
Pass Phrase
Personal identification number
Challenge response
Weakness: is that any of these can often be stolen,
accidentally revealed, or forgotten by the user
Ownership Method Factors
 Photo Id
 Key Cards- swipe or scan to get authentication
 Wrist Bands
 Security Token
 Cell phone hardware token
 Cell Phone software token
 hardware/software tokens acts like an electronic key to access
something.
Inherence Method Factors
 Fingerprints
 Retina scans
 Iris scans
 Signatures
 Face/voice recognition
 Hand patterns
 Palm vein authentication
Authorization
 Process that determines if a user has been
specifically and explicitly authorized by the proper
authority to perform a function
 Authorization can be handled in 3 ways:
Authorization for each authenticated user : in which the system
performs an authentication process to verify each entity and then
grants access to resources to only that entity
 Authorization for members in a group: in which the system
matches authenticated entities to a list of group memberships and
then grants access to resources bases on group’s access rights
 Authorization across multiple systems: in which a central
authentication and authorization system verifies entity ID’s and
grants a set of credentials to the verifies entity

Accountability
 Ensures that all actions on a system can be
attributed to an authenticated identity
 Actions could be ones that the entity is authorized
for: such as modifying data,
 Or could include unauthorized attempts: such as
modifying data that is beyond access level
 Accountability is accomplished by implementing
system logs and database journals
Managing Access Control
 Access control policy: which specifies how access
rights are granted to entities and groups
 Policy must include:




Reviewing all access rights periodically
Granting access rights
Changing access rights when needed
Revoking access rights
Firewalls
 A network security system that controls the
incoming and outgoing network traffic
 Can filter based on: IP address, type of packet, port
request, and other elements presented in packet
 Examines for packets for compliance with or
violation of rules configured into firewalls database
Managing Firewalls
 Training
 Read manuals and get educated on the firewall
 Uniqueness
 Each brand of firewall is different, so you must learn what
differences the firewalls you are using have
 Responsibility
 Each and every person in security has a responsibility to keep
the firewall updated and safe from hackers
 Administration
 Must have administration hired to help with the firewalls
Scanning and Analysis Tools
 Used to find vulnerabilities is systems, holes in
security components, and other unsecured points
 Different types of scanners and tools:





Port Scanners
Vulnerability Scanners
Packet Sniffers
Content Filters
Trap and trace
Port Scanners
 Are a group of utility software applications that can
identify computers that are active on a network, as
well as the active ports and services on those
computers
 The functions and roles fulfilled by the machines
 Can scan for specific computers, protocols,
resources, or conduct generic scans
 The more specific the scanner is, the more detailed
and useful the information is provided
Vulnerability Scanners
 Variants of port scanners, are capable of scanning
networks for very detailed information
 It can identify exposed user names and groups, show
open network shares, and expose configuration
problems
 Can also show what firewalls and OS/version is
running
Packet Sniffers
 Is a network tool that collects and analyzes copies of
packets from the network
 Can provide a administrator with valuable
information to help diagnose and resolve networking
issues



Can examine both live network traffic and previously captured
data
Including language filtering
TCP session reconstruction utility
Content Filters
 Is a software program that allows administrators to
restrict content that comes into a network
 Such as: web sites with nonbusiness related material


Pornography websites
Entertainment websites
 Can also keep spam e-mails away
Trap and Trace
 Application that entice individuals who are illegally
perusing the internal areas of a network by providing
simulated rich content areas but distract the attacker
while the software notifies the administrator of the
intrusion
 Then the administrator determine the identity of
someone discovered in the unauthorized areas of the
network or systems
Cryptography and Encryption
 Is the set of processes involved in encoding and
decoding messages so that others cannot understand
them
 Encryption: is the process of converting an original
message into a form that cannot be used by
unauthorized individuals
 Messages are decoded by algorithms and keys used
to perform the encryption
References
 Management of Information Security- Whitman and
Mattord
 http://en.wikipedia.org/wiki/Authentication
 http://searchsecurity.techtarget.com/feature/Protec
tion-Mechanisms