IAS Chapter 4 Final
IAS Chapter 4 Final
• Authentication-is the process by which you verify that someone is who he claims to be.
• Authentication does not determine what tasks the individual can do or what files the
individual can see.
• Authentication merely identifies and verifies who the person or system is.
• Most systems use identification and authentication through user name and password.
4. 1. Authentication Basics…
Authentication technology provides access control for systems by checking to
see if a user's credentials match the credentials in a database of authorized users or
in a data authentication server.
• 4.1.1. Password
• Password is a word, phrase, or string of characters intended to differentiate an
authorized user or process (for the purpose of permitting access) from an
unauthorized user, or put another way, a password is used to prove one’s
identity, or authorize access to a resource.
• A password is usually paired with a username or other mechanism to provide
authentication, Generally it is hard to remember, and easier to crack.
Authentication Basics…
4.1.2 . Biometrics
• The term biometrics is derived from the Greek words bio, meaning life, and
metric, meaning to measure.
• Biometrics is the measurement and statistical analysis of people's unique
characteristics.
• The technology is mainly used for identification and access control or for
identifying individuals who are under surveillance.
• The basic premise of biometric authentication is that every person can be
accurately identified by intrinsic physical or behavioral traits.
Authentication Basics…
Biometrics are largely used because of two major benefits:
• The convenience of use: Biometrics are always with you and cannot be lost or
forgotten.
• Difficult to steal or impersonate: Biometrics can’t be stolen like a password or
key can.
• Two main types of biometrics: Biometric recognition is the individual's
presentation of his unique biometric parameter and the process of comparing it
with the entire database of available data.
Physical identification
Behavioral identification
Biometrics ….
Physical
•DNA
•Ear Shape
Authentication Basics…
Authentication
Authenticators are based on at least one of the following 4 factors:
• Something you know: password or a personal identification number (PIN).
This assumes that only the owner of the account knows the password or PIN.
• Something you have: smart card or security token. The owner is assumed to
have the smart card needed to unlock the account.
• Something you are: fingerprint, voice, or retina.
• Where you are: inside or outside a company.
AAA server
• Authorization
• Authorization-determines what a subject can do, means to grant access to the system.
• The type of authentication required for authorization may vary; what does it mean ?
• Passwords may be required in some cases but not in others. ( E.g., SIMS, ATM
card, Credit card, web page)In some cases, there is no authorization; any user may
be use a resource or access a file simply by asking for it.
• Accountability-identifies what a subject (or all subjects associated with a user) did.
• It uses system components such as audit trails (records) and logs to associate a
subject with its actions.
• Authentication use a trusted third party, such as a bank, key distribution center
(KDC), Authentication Server (AS) ,Ticket Granting Server (TGS) , etc.
Smart cards and memory cards
• Access control models are methods which enables one to grant the right level of
permission to an individual so that they can perform their duties based on the rated
permission. Access control models have four flavors:
• MAC criteria are defined by the system administrator, strictly enforced by the
operating system or security kernel, and are unable to be altered by end users.
• When a person or device tries to access a specific resource, the OS or security kernel
will check the entity's credentials to determine whether access will be granted.
• Discretionary Access Control (DAC) allows each user to control access to their
own data.
• DAC is typically the default access control mechanism for most desktop
operating systems.
Discretionary access control (DAC)…
• Instead of a security label in the case of MAC, each resource object on a DAC
based system has an Access Control List (ACL) associated with it.
• An ACL contains a list of users and groups to which the user has permitted
access together with the level of access for each user or group.
• For example, User A may provide read-only access on one of her files to User
B, read and write access on the same file to User C and full control to any user
belonging to Group 1.
Discretionary access control (DAC)…
• Example is the Unix file mode which represent write, read, and execute in each of
the 3 bits for each of User.
Rule-Based Access Control (RBAC or RB-RBAC)
• As with MAC, access control cannot be changed by users. All access permissions
are controlled solely by the system administrator.
• As with DAC, access properties are stored in Access Control Lists (ACL)
associated with each resource object. When a particular group attempts to access a
resource, the OS checks the rules contained in the ACL for that object.
• Rule-based access controls are preventative – they don’t determine access levels
for employees. Instead, they work to prevent unauthorized access.
• Rule-based models are generic – they apply to all employees, regardless of role.
Role-Based Access Control (RBAC)
• For instance, the accountant gets the same permissions as all other accountants,
nothing more and nothing less.
Thank You!!!