IS Lecture 07 - Access Control
IS Lecture 07 - Access Control
• Object
— A passive entity that contains data or functionality
• Subject
— An active entity that requests access to an object or the
data within an object
• Access
— Flow of information between a Subject and an Object
• Access Control
— Security features that control how Subjects
communicate and interact with Objects
— They protect the systems and resources from
unauthorized access
2
Subjects vs. Objects
3
4 steps for a Subject to Access an Object
4
4-Steps for a Subject to Access an Object
• Identification
— Method of ensuring that a Subject is unique and recognized by
the system
— User name, user ID, account number, Certificate, etc.
• Authentication
— Verifying the identification information
— Password, Passphrase, Key, PIN value, biometric etc.
• Authorization
— Using criteria to allow the operations that subjects can carry
out on objects
• Accountability
— Audit logs and monitoring to track subject activities with
objects
5
Threats to Access Control
• Stop Authorized Access of Legitimate User
—Denial of Service (DoS)
• Unauthorized Access by Illegitimate User
—Shoulder Surfing, Tapping, Sniffing
—Spoofing, Intrusion, Replay Attacks
—Password Cracking
—Malicious Software, Buffer Overflows
—Backdoors, Help Desk Frauds
—Theft, Social Engineering, Data Mining
—Emanations, Data Remanence
—And many more
6
Digital Identity
• Traditionally, identity is taken as a user ID
that is mapped to an individual
• A Digital identity may be made up of
attributes, entitlements, and traits
—Attributes (department, role in company,
shift time, clearance, etc.)
—Entitlements (resources available to users,
authoritative rights in the company, etc.)
—Traits (biometric information, height, gender,
etc.)
7
Access Criteria
• Different types of criteria can be used:
—ID
—Role
—Group
—Physical or Logical Location
—Time of Day
—Transaction Type
8
Identification Requirements
• Important guidelines for issuing
identification values to users:
—Each value should be unique, for user
accountability.
—Standard naming scheme should be followed.
—Value should be non-descriptive of the
user’s position or tasks.
—Value should not be shared between users.
9
Authentication Factors
• Three general factors that can be used for
authentication:
• Something a person knows
— authentication by knowledge
— E.g. Password, PIN, Key
• Something a person has
— authentication by ownership
— E.g. Smart Card, ATM Card, USB Dongle, Mobile Phone
• Something a person is
— authentication by characteristic
— E.g. Biometric, Fingerprint, Face recognition
11
Multi-Factor Authentication
• Strong Authentication
—Use more than 1 authentication factors,
preferably 2
—Two-Factor Authentication
– Use at least 2 authentication factors
– E.g. ATM Card + PIN
—Three-Factor Authentication
– Use 3 authentication factors
– E.g. Smart Card + PIN + Biometric
12
Mutual Authentication
• Two communicating entities authenticate
to each other before passing data
• In majority of cases, only client/user
authentication is implemented
—This leads to server/service impersonation
attacks
• Server authentication is as important as
the client authentication
13
Access Control Layers
• Administrative Controls
—Policy and procedures, Personnel controls
—Supervisory structure
—Security-awareness training, Testing
• Physical Controls
—Network segregation, Perimeter security
—Computer controls, Work area separation
—Data backups, Cabling, Control zone
• Technical Controls
—System access, Network architecture & Access
—Encryption and protocols, Auditing
14
Access Control Models
• AC Model dictates how subjects access objects
• Uses AC technologies and security mechanisms
15
Access Control Techniques
• Access Control List (ACL) Bound to an object
and indicates what subjects can access it and
what operations they can carry
16
Access Control Techniques
• Rule-based Access Restricts subjects’ access
attempts by predefined rules
—Content-based Access Bases access
decisions on the sensitivity of the data, not
solely on subject identity
—Context-based Access Bases access
decisions on the state of the situation, not
solely on identity or content sensitivity
17
Access Control List (ACL) Example
18
ACL vs. Capability Table
Subject-1 Operation-1
Operation-2 Object
Subject-2
Operation-3
Subject-3
Operation-1 Object-1
Operation-2
Subject Object-2
Operation-3
19
Access Control Matrix (Example)
20
Password Management
21
Questions ???