Unit 4 1
Unit 4 1
Authentication is the act of establishing the same claim as users identify on a computer
system. As opposed to identification, authenticity is the process of verifying a person's
or thing's identification. Personal identification must be validated, the website's validity
must be validated with a digital certificate, the relic must be carbon dated, and the
product or document must not be counterfeit.
The process of determining the claimed user is known as authentication
. This is the first stage of the security procedure. Completing the authentication procedure in less than or equal
● The password
● Biometric identification
Before providing access, the system may need to validate numerous factors correctly.
This multi-factor authentication (MFA) requirement frequently allows for additional
protection beyond what passwords alone would give
What is Authorization?
Authorization is the capacity to assign privileges/privileges to a resource, and it pertains
to information security in general and k security, in particular, access control. In a more
formal sense, "authorization" refers to the process of creating an access policy. In
system security, authorization is the process of giving access to a specified resource or
function. This phrase is frequently used interchangeably with access control and client
permission.
Permission can allow someone to download specific files from a server or provide
particular users administrative access to a program.
Certification is always required for approval in a secure setting. Before the organization
administrator gives access to the requested resources, users must first confirm their
identification.
Types of Access Control
Access control is one of the easiest and most effective ways to meet your
security needs. Yet, not all techniques work the same way. In this section, I’ll go
through the 5 main types of access control you’ll run into.
Above all others, MAC is the most strictly enforced control method. All
the access control settings and configurations are only accessible by the
administrator. You can’t change anything without their permission.
For instance, if you have 100 users in your business, you’ll have to configure 100
different roles and permissions in the system to use MAC. Above all others, it’s
one of the most robust access control techniques due to its simplicity.
Similarly, it’s also the most inflexible method as every change needs to occur at a
granular level.
MAC systems are often used in SMEs or specific silos within a larger business
that requires high-security levels. If you’re looking for a compromise in
functionality and usability then RBAC may be for you.
If you’re looking for access control that allows you to restrict or allow access on
object-level irrespective of roles, DAC could be the right fit
m(DAC)
Policies define an object owner, and many owners can exist within the business.
Unlike RBAC, for instance, which uses group-level permissions, DAC uses
object-level permissions. DACs are discretionary because the object owners can
transfer, change, or extend each object. In essence, this gives you the power to
quickly scale a business.
DAC provides granular access control that suits businesses having dynamic
security needs. Firstly, DAC allows you to change or transfer ownership of an
object from one user to another. Secondly, the object access in DAC uses
an access control list (ACL) authorization. This is built on user identification
and/or group membership. To this end, DAC offers several advantages:
A system called an intrusion detection system (IDS) observes network traffic for
malicious transactions and sends immediate alerts when it is observed. It is
software that checks a network or system for malicious activities or policy
violations. Each illegal activity or violation is often recorded either centrally using
a SIEM system or notified to an administration. IDS monitors a network or system
for malicious activity and protects a computer network from unauthorized access
from users, including perhaps insiders. The intrusion detector learning task is to
build a predictive model (i.e. a classifier) capable of distinguishing between ‘bad
connections’ (intrusion/attacks) and ‘good (normal) connections’.
● Attackers can use SQL Injections to find the credentials of other users
in the database. They can then impersonate these users. The
impersonated user may be a database administrator with all database
privileges.
● SQL lets you select and output data from the database. An SQL
Injection vulnerability could allow the attacker to gain complete access
to all data in a database server.
● SQL also lets you alter data in a database and add new data. For
example, in a financial application, an attacker could use SQL Injection
to alter balances, void transactions, or transfer money to their account.
● You can use SQL to delete records from a database, even drop tables.
Even if the administrator makes database backups, deletion of data
could affect application availability until the database is restored. Also,
backups may not cover the most recent data.
● In some database servers, you can access the operating system using
the database server. This may be intentional or accidental. In such
case, an attacker could use an SQL Injection as the initial vector and
then attack the internal network behind a firewall.
There are several types of SQL Injection attacks: in-band SQLi (using
database errors or UNION commands), blind SQLi, and out-of-band SQLi.
You can read more about them in the following articles: Types of SQL
Injection (SQLi), Blind SQL Injection: What is it.
These input fields are vulnerable to SQL Injection. An attacker could use SQL
commands in the input in a way that would alter the SQL statement executed
by the database server. For example, they could use a trick involving a single
quote and set the passwd field to:
password' OR 1=1
Because of the OR 1=1 statement, the WHERE clause returns the first id from
the users table no matter what the username and password are. The first
user id in a database is very often the administrator. In this way, the attacker
not only bypasses authentication but also gains administrator privileges. They
can also comment out the rest of the SQL statement to control the execution
of the SQL query further: