Unit - II User Authentication & Access Control
Unit - II User Authentication & Access Control
) 10 Marks
Shoulder Surfing: Shoulder surfing is a form of data theft where criminals steal
personal information by observing victims when they're using devices such as
ATMs, computers, kiosks, or other electronics.
Shoulder surfing refers to a direct observation, such as looking over a person's
shoulder, to obtain information.
Shoulder surfing is a similar procedure in which attackers position themselves in
such a way as-to be-able to observe the authorized user entering the correct
access code or data.
Prevention:
i. Pick strong passwords so it’s hard for any observer to guess what you typed.
ii. Attach a screen protector on computers to obscure your screens.
iii. Lock your computer screen at work when you leave your desk.
Dumpster Diving: “Dumpster diving” is one of the easiest ways to find out
information about a company or its customers. Sometimes also referred to as
trashing.
“Dumpster Diving” means searching trash for useful information. The trash may
be in a public dumpster or in a restricted area requiring unauthorized entry.
Dumpster diving depends on a human weakness: the lack of security knowledge.
Many things can be found dumpster diving (e.g., CDs, DVDs, hard drives,
company directories, and so forth).
Dumpster diving is an interesting attack that produces an immense amount of
information on an organization, firm, individual, or entity. A lot information can be
gathered about a person or company from the trash they throw away.
Prevention:
• Destroy any CDs/DVDs containing personal data.
• In case you no longer need your PC, make sure you have deleted all the data
so that it can’t be recovered.
• Use of firewalls can prevent suspicious Internet users from accessing the
discarded data.
• Paper documents should be permanently destroyed/shredded.
• Companies should lock waste bins and should have a safe disposal policy.
2.2 Biometrics:
Biometrics is idea to map measurements of human physical characteristics
to human uniqueness. Biometric refers study of methods for uniquely
recognizing humans based upon one or more intrinsic physical or behavioral
characteristics. Biometric identification is used on the basis of some unique
physical attribute of the user that positively identifies the user.
Example: finger print recognition, retina and face scan technique, voice synthesis
and recognition and so on. Physiological are related to shape of the body. For
example finger print, face recognition, DNA, palm print, iris recognition and so on.
Behavioral are related to the behavior of a person. For example: typing rhythm,
gait, signature and voice.
The major biometrics forms are:
• Finger Prints
• Handprint
• Retina Patterns
• Voice Patterns (Voice/Speech)
• Signature and Writing Patterns (Handwriting/Signature)
• Keystrokes
Figure: Various Types of Biometric Authentication Techniques
Construction:
The first time an individual uses a biometric system is called an enrollment.
During the enrollment, biometric information from an individual is stored. In the
subsequent uses, biometric information is detected and compared with the
information stored at the time of enrollment.
Biometric system consists of following blocks:
1. Sensor
2. Preprocessing
3. Feature Extractor
4. Template Generator
5. Stored Templates
6. Matcher
7. Application Device
Working:
1. The first block of the biometric system sensor is the interface between the real
world and the system which has to acquire all the necessary data.
2. The second block performs all the necessary pre-processing.
3. In the third block, necessary features are extracted. This step is an important
step as the better features was extracted in an optimal way.
4. A vector of numbers or an image with particular properties is used to create a
template.
5. During the enrollment phase, the template is simply stored in the database of
biometric system.
6. During the matching phase, the obtained template is passed to a matcher that
compares it with other existing stored templates.
7. The matching program will analyzes the template with the input.
8. This will then be output for any specified use or purpose like special entrance.
2.3 Access controls:
Access controls are security features that control how users and systems
communicate and interact with other systems and resources.
Access is the ability of a subject to interact with an object. Authentication deals with
verifying the identity of a subject. It is ability to specify, control and limit the
access to the host system or application, which prevents unauthorized use to
access or modify data or resources.
It can be represented using Access Control matrix or List:
Read, Write,
Process 1 --- Read Read Write
Execute
Read, Write,
Process 2 Execute Read Read, Write Write
Execute
Policies: An authorization policy states the actions that persons are permitted to
do within a system.
Most recent operating systems execute authorization policies as official sets of
permissions that are modifications or expansions of three basic types of access:
Read (R): The subject can only
• Read file contents
• List directory contents
Write (W): The subject can alter the contents of a file or directory with the
following tasks:
• Add
• Update
• Delete
• Rename
Execute (X): If the file is a program, the person can initiate the program to run.
(In Unix- systems, the "execute" permission doubles as a "traverse directory"
permission when granted for a directory.)
These privileges and permissions are applied differently in the systems based on
discretionary access control (DAC), mandatory access control (MAC) and role-
based access control (RBAC).