Kemanan Informasi Pertemuan 9
Kemanan Informasi Pertemuan 9
Management
Pertemuan 9
• Authentication (password/crypto/etc.)
– Who are you?
• Authorization (Acess control)
– What are you allowed to do.
– Focus is policy
• Enforcement Mechanism
- How its policy implemented/enforced
Authentication Mechanism
• Mechanism types:
– Something you know
– Something you have
– Something you are
– Something you produce
• Strong authentication uses at least two different
authentication mechanism types
Something You Know
• This type of authentication mechanism verifies the user’s
identity by means of a password, passphrase, or other unique
code
• A password is a private word or combination of characters that
only the user should know
• A passphrase is a plain-language phrase, typically longer than a
password, from which a virtual password is derived
• A good rule of thumb is to require that passwords be at least
eight characters long and contain at least one number and one
special character
Password Power (1)
Password Power (2)
Check Password Power
• https://howsecureismypassword.net/
• https://password.kaspersky.com/
Something You Have
• Authentication
– ID Check
• Access Control
– Visitor - allowed in
– Member - allowed to borrow
– Staff - allowed to access All area
• Enforcement Mechanism
– Walls, Doors, Locks, Bouncers
What do this for?
• Subjects
– can be processes, modules, roles
• Objects
– can be files, processes, etc.
• Authentication often used to subjects, but not necessary.
– e.g. process assumes identity of one subject, then
another.
• Authorization often focus on objects
Elementary Form
Objects
A B C D
alice 0 0 1 0
bo 1 1 0 1
subject
b
s charlie 0 0 1 0
dave 1 1 0 1
Access Right
• Document/ File:
– Read
– Write
– Delete
• Server:
– Start
– Stop
– Reboot
Adding Access Rights
• Access Rights
– e.g. Simple: Read, Write
– e.g. Complex: execute, change ownership
Objects
A B C D
alice r r/w r -
bo r r - r/w
subject
b
s charlie - - w -
dave r/w - w
Grouping
• Subjects
– Groups e.g. staff = {alice,dave}, students = {bob, charlie},
department, etc
• Objects
– Types e.g. system_file = {A,B}, user_file = {C,D}
• Can have compound names
– e.g. in AFS talg:friends, system:backup
ACL’s (Access Control Lists)
• What if I break my matrix down by columns?
– Each object has a set of <user, right> tuples
– A {<bob, r/w>, <alice,w>}
• Properties
– Good for many applications (file systems)
– Can grow quite large
ACL’s (Access Control Lists)
Capabilities
• What if I break my matrix down by rows
– Alice {<A,r/w>, <B,w>, <C,r>}
• Properties
– Natural model for delegation (rights coupled to object)
• Each tuple can be viewed as a handle to an object
Capabilities List
Protection Domain