0% found this document useful (0 votes)
46 views41 pages

2 Authentication - Access Control & Cryptography

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views41 pages

2 Authentication - Access Control & Cryptography

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1

SECURITY IN Toolbox:
Authentication, Access
COMPUTING, Control, and
Cryptography

FIFTH EDITION
2

Authentication
• The act of proving that a user is who
she says she is

• Methods:
• 1. Something the user knows
• 2. Something the user is
• 3. Something user has
• 4. Location Factors
• 5. Behavioural Factors
3

1. Something You Know


• Passwords

• Security questions

• Knowledge Factors Are The Least Secure Authentication


Factors

• Attacks on “something you know”:


• Dictionary attacks
• Inferring likely passwords/answers
• Guessing
• Defeating concealment
• Exhaustive or brute-force attack
• Rainbow tables
4

2. Something the user is


Generally biometric Factors

• Something unique to the user's physical attributes.

• Examples include fingerprints, facial recognition, voice recognition,


retina scans, and other forms of biometric data.

• Banks and investment firms commonly use voice recognition when


you call them to verify your identity. Your voice is analyzed based on
its acoustics and individual characteristics like your accent, speech
rhythm, and vocabulary.

• As an example of multi-factor authentication that uses biometrics,


consider your cell phone. You can enable multi-factor authentication
so that you have to enter a PIN (something you know) and scan your
fingerprint (something you have).

• Biometrics are a convenient form of authentication because you


have them readily available.
5

2. Biometrics - problems

Intrusive – Expensive -Single point of failure - Sampling


error - False readings – Speed - Forgery
6

3. Something the user has


Possession factor technologies include the following:

• Security tokens are small hardware devices that store a user's personal
information and are used to authenticate that person's identity electronically.
The device may be a smart card, an embedded chip in an object, such as a
Universal Serial Bus (USB) drive, or a wireless tag.

• A software-based security token application generates a single-use login


PIN. Soft tokens are often used for mobile multifactor authentication, in which
the device itself -- such as a smartphone -- provides the possession factor
authentication.

Typical possession factor user scenarios include the following:

• Mobile authentication, where users receive a code via their smartphone to gain
or grant access -- variations include text messages and phone calls sent to a
user as an out-of-band method, smartphone OTP apps, SIM cards and smart
cards with stored authentication data; and

• Attaching a USB hardware token to a desktop that generates an OTP and using
it to log in to a VPN client.
7

4. Location Factors
• Somewhere the user is.

• This can involve geolocation services to verify that the user is


accessing the system from an expected or approved location.

• Some see it as authorisation factor instead of an authentication


factor

• Three main difficulties around the use of location to help give


confidence that an identity is authentic are

• Specificity - How much space do you occupy at any one time

• Accuracy - consumer hardware is affected by so many variables, that we can’t


trust any location data is accurate at this level of resolution with current
technology.

• Reliability - we need to know that the data provided, even if really accurate, is
authoritative. Location data as it stands is often trivial to spoof, there are also issues
with GPS jamming,
8

5. Behavioural Factor
• Something related to the user's behaviour or patterns of interaction.

• Examples include typing speed, mouse movement patterns, and other behavioural characteristics.

• Benefits of behavioural biometrics authentication, include the following:

REMOVE ANY UNCERTAINTY ABOUT A USER’S IDENTITY


• Behavioural biometrics authentication uses unique data points to continuously authenticate a user,
irrespective of what they’re doing on their computer. This eliminates any opportunity for identity theft
or fraud since there is no way to steal or replicate biometric information.

PRESERVE PRIVACY
• Behavioural biometrics authentication does not reveal user identity like traditional authentication
methods do. This preserves user privacy and allows them to keep their personal information private.

EVALUATION OF USER INTERACTION WITH THE DEVICE IN REAL TIME


• Behavioural biometrics authentication evaluates a user’s ongoing interaction with their device in real
time, making it harder for hackers to get around security measures.

MORE SECURE THAN TRADITIONAL SECURITY MEASURES


• Unlike standard security measures, which are susceptible to theft or replication, behavioural
biometrics authentication is almost impossible to replicate. This makes it more secure than traditional
security measures.
9

Multi-factor Authentication

When implementing MFA, it's generally recommended to


use a combination of these factors to ensure a higher
level of security. For example, a common MFA setup might
involve a password (knowledge factor) and a one-time code
from an authenticator app (possession factor).

This way, even if one factor is compromised, the attacker


would still need the other factor to gain access
10

Distribution of Password Types


11

Password Storage
1. Use Strong Encryption: - Employ strong, industry-standard encryption algorithms (like bcrypt, scrypt, or Argon2) to hash
passwords before storing them. Avoid using weak or outdated encryption methods.

2. Salted Hashing: Always use a unique, random value (known as a "salt") for each password before hashing. This helps
protect against rainbow table attacks.

3. Avoid Plain Text Storage: - Never store passwords in plain text. If a database is breached, plain text can be easily exploited.

4. Implement Key Strengthening: - Use techniques like key stretching to make the hashing process computationally intensive.
This slows down brute-force and dictionary attacks.

5. Regularly Update Password Hashes: - Periodically rehash passwords using stronger algorithms or longer salts. This helps
to stay ahead of advances in computational power.

6. Protect the Database: - Implement strong access controls and encryption for the database where passwords are stored.
Use firewalls and intrusion detection systems to safeguard against unauthorized access.

7. Access Control: - Limit access to the password database to only those who need it. Use strict access controls and strong
authentication for administrators.

8. Monitor for Anomalies - Set up monitoring systems to detect unusual activity related to password storage or access.

9. Multi-Factor Authentication (MFA): - Implement MFA for privileged users who have access to password databases.

10. Use a Trusted Password Manager: If possible, encourage users to use trusted password managers to generate, store,
and manage their passwords securely.

11. Regularly Audit Password Security: - Conduct regular security audits and vulnerability assessments to identify and address
any weaknesses in the password storage process.
12

Brute Force Hacking


Brute force hacking is a method used by attackers to gain unauthorized access to a system or an account
by systematically trying out all possible combinations of usernames and passwords until the correct one is
found. This method does not rely on any specialized knowledge or vulnerabilities in the system; instead, it
relies on the sheer computational power and persistence of the attacker.

1.Selection of Target: The attacker identifies a target, which could be a specific account (like an email or
social media account) or a system (like a website, server, or application) that they want to access.

2.Credential List: The attacker compiles a list of potential usernames and passwords. These lists can be
generated in various ways, including using common passwords, dictionary words, or by harvesting data
from previous breaches.

3.Iteration: The attacker uses a program or script to automate the process of attempting to log in. The
program iterates through the list of usernames and tries each one with every password.

4.Testing Credentials: For each combination of username and password, the program sends a login request
to the target system. If the combination is correct, the attacker gains access.

5.Iterative Process: The process continues until the correct combination is found or until the entire list of
possible combinations has been exhausted.

6.Time and Resources: The success of a brute force attack depends on the strength and complexity of the
passwords, the computational power available to the attacker, and the effectiveness of any
countermeasures in place (such as account lockouts after a certain number of failed login attempts).
13

Bruce Force Hacking Countermeasures


1. Account Lockouts: After a certain number of failed login attempts, an account may be
temporarily locked to prevent further unauthorized access attempts.
2. CAPTCHA: CAPTCHA challenges can be used to differentiate between human users
and automated scripts.
3. Strong Password Policies: Requiring complex passwords with a combination of
uppercase, lowercase, numbers, and special characters can significantly increase the
difficulty of a successful brute force attack.
4. Multi-Factor Authentication (MFA): Adding an extra layer of authentication, e.g. a
one-time code sent to a user's mobile device, greatly mitigates the effectiveness of
brute force attacks.

It is important for individuals and organizations to implement strong password practices and
other security measures to protect against brute force attacks
14

How Long Does It Take a Hacker to Brute Force a Password

Hive Systems conducts annual research to determine how long it takes to crack
passwords

Provides a time of how long it would take a hacker with a consumer budget to
crack passwords using a desktop computer with a top-level consumer-grade
graphics card.

If a password is set of 8 characters, using the NIST recommendation of choosing


a randomly generated string of 8-characters, using a top-of-a-range GPU that
was available in 2018 (RTX 2080) it would take 4 hours to crack a password with
numbers, upper- and lower-case letters, and symbols.

Today, using the latest GPUs (RTX 4090) it takes just 59 minutes, but if cloud
resources were used, the time taken to crack the password drops to just 19
minutes if using 8 x A100 GPUs from Amazon AWS, and 12 minutes if using 12.

The table on next slide shows how long it would take a hacker using standard
equipment to guess a password
15

Time it takes hackers to brute force


passwords
16

Federated Identity
Management
FIM is a system of single login, multiple access. For FIM to work effectively,
all involved partners must have a sense of mutual trust. Each trust domain
maintains its own identity management.

However, all domains are interlinked through a third-party service that


stores users' access credentials and provides the trust mechanism needed
for FIM to work. This third service is known as the identity provider or broker.

Users' credentials are provided to and stored with their identity provider,
which is their home domain. Then, when logging in to a service such as a
software-as-a-service application, they don't have to provide credentials
to the service provider. Rather, the service provider trusts the identity
provider to validate these credentials and grant them access.

Examples of FIM systems include OpenID and Open Authorization, as well


as Shibboleth, which is based on the Organization for the Advancement of
Structured Information Standards' Security Assertion Markup Language
(SAML).
17

Federated Identity
Management

A federated identity management scheme is a union of separate


identification and authentication systems. Authentication is performed in
one place, and separate processes and systems determine that an
already authenticated user is to be activated
18

Single Sign-On

Single sign-on lets a user log on once per session but access many different
applications/systems.

It often works in conjunction with federated identity management, with the


federated identity provider acting as the source of authentication for all the
applications.

Google, LinkedIn, Apple, Twitter and Facebook offer popular SSO services
that enable end users to log in to third-party applications with their social
media authentication credentials.
19

Single Sign-On vs FIM


Single sign-on (SSO) is an important component of FIM, but it is not the
same as FIM.

Implementing single sign-on doesn't necessarily require FIM, but the latter
does rely heavily on SSO technologies for authentication among domains.

SSO enables users to use a single set of credentials to access multiple


systems within a single organization. It is token-based, meaning that users
are identified by a token rather than a password.

FIM enables users to access systems across federated organizations. They


can use the same credentials to access the applications and networks of
all members within the federated group. It provides single-step access to
multiple systems across different organizations. Unlike SSO, FIM users don't
provide credentials directly to an application, but to the FIM system itself.

Organizations that implement SSO do not necessarily use FIM. However, FIM
relies heavily on SSO technologies to authenticate users across domains.
20

Access Policies
• Goals:
• Check every access
• Enforce least privilege
• Verify acceptable usage

• Track users’ access

• Enforce at appropriate
granularity

• Use audit logging to


track accesses
21

Data Loss Prevention


(DLP) is a must-have Data Loss Prevention
security function for all
organizations. Used to
identify and prevent the
theft or misuse of
sensitive data (e.g.,
social security numbers,
financial information,
account credentials…)

It inspects content for


anomalies and to
identify user activities
that do not comply with
company guidelines or
government regulations.

It is an essential first line


of defence.

Its performance,
however, depends on
the level and quality of •Expanded visibility into user identifiers and actions
the traffic intelligence it •Insights into links and attached files in email
receives and therefore •Extraction of files and/or file metadata (e.g., file extension, size, type, name,
on the deep packet content)
inspection (DPI) •Access to security metadata that enables the identification of tunneling on
technology it uses. protocols like DNS or ICMP
•Classification of encrypted and evasive traffic
22

Access Control

Access Control Directory

Access Control List


Access Control
Matrix
23
24

Encryption

• Sender
• Recipient
• Transmission medium
• Interceptor/intruder
• Encrypt, encode, or
encipher
• Decrypt, decode, or
decipher
• Cryptosystem
• Plaintext
• Ciphertext
25

Problems Addressed by Encryption


• Suppose a sender
wants to send a
message to a
recipient. An attacker
may attempt to

• Block the message


• Intercept the message
• Modify the message
• Fabricate an
authentic-looking
alternate message
26

Encryption/Decryption Process

The basic process of encrypting and then decrypting data.


Public Key (Asymmetric)
Cryptography
• Instead of two users sharing one secret key, each user
has two keys: one public and one private

• Messages encrypted using the user’s public key can only


be decrypted using the user’s private key, and vice
versa
28

Symmetric vs. Asymmetric

The critical difference between symmetric and asymmetric is that symmetric


uses a single key for both encryption and decryption, whereas asymmetric
uses complementary keys.
29

Stream vs Block Ciphers

In a stream cipher, each byte of the A block cipher encrypts a


data stream is encrypted separately. group of plaintext symbols
as a single block.
30

DES: The Data Encryption


Standard
• Symmetric block cipher
• Developed in 1976 by IBM for the US National Institute of
Standards and Technology (NIST)
31

AES: Advanced Encryption System


• Symmetric block cipher
• Developed in 1999 by
independent Dutch
cryptographers
• Still in common use
32

DES vs. AES


33

Secret Key vs. Public Key Encryption

Symmetric and asymmetric algorithms have complementary strengths and


weaknesses and are therefore used both for different purposes and in
concert with each other.
34

Public Key to Exchange Secret Keys

This shows asymmetric and symmetric encryption being used together.

We need asymmetric to perform the initial exchange securely, but thereafter


we can benefit from the speed of a symmetric algorithm.
35

Key Exchange Man in the Middle

This exchange is the same as on the previous slide, but with an attacker in the
middle.
36

Error Detecting Codes


• Demonstrates that a block of data has been
modified

• Simple error detecting codes:


• Parity checks
• Cyclic redundancy checks
Parity Check
• Cryptographic error detecting codes:
• One-way hash functions
• Cryptographic checksums
• Digital signatures
37

One-Way Hash Digital


Function Signature
A one-way hash function in computer
science is a function that is easy to
compute on any given input, but
extremely difficult to reverse engineer
and obtain the original input from its
hash value alone.

It is a fundamental tool used in


cryptography, data security, and
various other applications
38

Certificates: Trustable Identities & Public


Keys
• A certificate is a public
key and an identity
bound together and
signed by a certificate
authority.

• A certificate authority is
an authority that users
trust to accurately verify
identities before
generating certificates
that bind those identities
to keys.
39

Certificate Signing and Hierarchy

HTTPS helps greatly in reducing the


information leaked to third parties. However,
it does not prevent tracking.
Modern browser fingerprinting techniques
work even behind HTTPS. Security
Diana’s certificate is made using researchers have developed a browser
Edward’s signature. Delwyn’s certificate extension called HTTPS Everywhere that
includes Diana’s certificate so that it can attempts to use HTTPS whenever possible
effectively be tied back to Edward, and at the same time mitigate the use of
creating a chain of trust. fingerprinting techniques.
40

Cryptographic Tool Summary


41

Summary
• Users can authenticate using something
they know, something they are, or
something they have

• Systems may use a variety of


mechanisms to implement access
control

• Encryption helps prevent attackers from


revealing, modifying, or fabricating
messages

• Symmetric and asymmetric encryption


have complementary strengths and
weaknesses

• Certificates bind identities to digital


signatures

You might also like