NIS - Unit - 2 Notes
NIS - Unit - 2 Notes
Authentication involves identifying a particular user based on their login credentials, such as
usernames and passwords, biometric scans, PINs, or security tokens.
Authorization refers to giving a user the appropriate level of access as determined by access
control policies. These processes are typically automated.
But managing password security can be quite expensive. A user plays very important role in
protecting a password.
There are a number of methods to crack a user’s password, but the most prominent one is a
Password Guessing Attack. Basically, this is a process of attempting to gain the system’s
access by trying on all the possible passwords (guessing passwords).
To combat these advancements, today's passwords need the following traits: At least 12
characters long is recommended, 8 at the minimum A combination of both upper- and
lower-case letters, numbers, and symbols Random enough that they do not contain any
predictable sequence.
Exhaustive search: A brute-force attack consists of an attacker submitting
many passwords or passphrases with the hope of eventually guessing correctly. The attacker
systematically checks all possible passwords and passphrases until the correct one is found.
Alternatively, the attacker can attempt to guess the key which is typically created from the
password using a key derivation function. This is known as an exhaustive key search.
Intelligent search: Here an attacker searches a password with the help of user’s personal
data, like name, DOB, family members names, phone numbers etc. Ex: Dictionary attack.
A dictionary attack is a brute-force technique where attackers run through common
words and phrases, such as those from a dictionary, to guess passwords. The fact people
often use simple, easy-to-remember passwords across multiple accounts means
dictionary attacks can be successful while requiring fewer resources to execute.
1
Protection techniques which can be used by users:
a. Default password: Keep on changing the default password given by administrator.
b. Length of password: Length of password should be at least 8 characters.
c. Password should have (A-Z) (a-z) (0-9) and some special characters like - !@#$&*,:;?
d. Avoid obvious password.
Password attacks
This type of attack is often seen in office buildings, where an attacker will follow someone
with an access badge into a secured area. It can also be seen in IT systems, where an
attacker may log into a system using another user’s credentials. Piggybacking can also be
used as a form of eavesdropping, where an attacker uses another person’s access to a
location in order to listen in on conversations or harvest sensitive information.
2
Piggybacking attacks are relatively easy to carry out and are often very hard to detect.
However, there are several steps that organizations can take in order to protect themselves
against this type of attack. For example, they can limit access to sensitive areas only to
authorized individuals with proper credentials or set up a system for detecting unauthorized
access attempts.
Overall, piggybacking is a serious security threat that can have serious consequences for
organizations. Therefore, it is important for organizations to be aware of this type of attack
and take measures to protect themselves against it.
Shoulder Surfing: Shoulder surfing is using direct observation techniques, such as looking
over someone’s shoulder, to get information. Shoulder surfing is an effective way to get
information in crowded place because it is relatively easy to stand next to someone and
watch as they fill out a form, enter a pin number at an ATM machine etc. It can also be done
long distance with the aid of binoculars or other vision-enhancing devices. This attack is the
most successful type of attack against password and some other graphical password.
Dumpster Diving: Getting familiar with the dumpster diving definition is the first step to fight
this attack. Here, cyber attackers take the idiom “One man’s trash is another man’s treasure”
to a whole new realm.
A person going through your trash can gather enough data to create a complex profile and
commit identity theft. Aside from physical trash, cyber actors can also access recycle or
electronic waste bins, phone list, calendar or organizational chart for sensitive information that
can severely compromise your company. Cybercriminals often use malware to achieve this.
When a dumpster diver goes through your trash, they’re looking for any information to
execute a cyberattack. Some of the data such criminals can obtain from your trash include:
To prevent dumpster divers from learning any valuable information about a user or his
organization, establish a disposal policy. Ensure all unwanted information, documents, notes,
3
and hardware is properly destroyed. Below are a few practices to prevent dumpster diving in
cyber security.
Biometrics:
Biometrics can be defined as the most practical means of identifying and authenticating
individuals in a reliable and fast way through unique biological characteristics.
The term Biometrics is composed of two words − Bio (Greek word for Life)
and Metrics (Measurements). Biometrics is a branch of information technology that aims
towards establishing one’s identity based on personal traits. Each human being is unique in
terms of characteristics, which make him or her different from all others. The physical
attributes such as finger prints, colour of iris, colour of hair, hand geometry, and behavioural
characteristics such as tone and accent of speech, signature, or the way of typing keys of
computer keyboard etc., make a person stand separate from the rest.
The biometric sample is acquired from candidate user. The prominent features are extracted
from the sample and it is then compared with all the samples stored in the database. When
the input sample matches with one of the samples in the database, the biometric system
allows the person to access the resources; otherwise prohibits.
4
Types of Biometric:
1. Fingerprints: Are an impression or mark made on a surface by a person's fingertip,
able to be used for identifying individuals from the unique pattern of whorls and
lines on the fingertips. It involves a finger size identification sensor with a low cost
biometric chip. Fingerprint matching system extracts no. of features from the
fingerprints for storage as a numerical substitute.
The software works by extracting meaningful features known as minutia points from
the fingerprint. The scanner picks out attributes such as orientation, change of ridge
direction, arches, loops and whorls in the print. Some scanners can even pick up
pores on the skin. The software then records and stores these minutia points in
order to verify the user’s identity in the future.
It's limitations:
a. Hardware and software programs can be expensive.
b. It can lead to false rejections and false acceptance.
c. It makes mistakes with dryness or dirty finger’s skin, and well as with age.
2. Hand Print: Handprint is obtained from the inner surface of a hand between the
wrist and the top of the fingers, which contains the principal lines, wrinkles and
ridges on the palm, finger and fingerprint. As in the case of finger print, everybody
has unique handprints. A handprint Biometric Systems scan hand and fingers and the
data is compared with the specimen stored for you in the system. The user is allowed
or denied based on the result of this verification.
3. Retina: Everybody has a unique retinal vascular pattern. Retina Pattern Biometric
system uses an infrared beam to scan your retina. Retina pattern biometric systems
examine the unique characteristics of user’s retina and compare that information
with stored pattern to determine whether user should be allowed access. Some
other biometric systems also perform iris and pupil measurements. Retina Pattern
Biometric Systems are highly reliable. Users are often worried in using retina
scanners because they fear that retina scanners will blind or injure their eyes.
5
5. Signature and Writing Pattern: Signature recognition is a biometric modality that
stores and compares the behavioural patterns which are integral to the process of
generating a signature. Some of the factors that are analysed include the speed,
variations in timing and the pressure applied to the pen when an individual
composes a signature.
Of all the biometric modalities in existence, signature recognition carries the most
potential in terms of adaptability, security and implementation. In addition, the costs
involved in the deployment and procurement of this biometric modality are minimal
in contrast to the much more complex modalities like retinal and fingerprint
recognition.
6. Keystrokes: The behavioural biometric of Keystroke Dynamics uses the manner and
rhythm in which an individual types characters on a keyboard or keypad. The
keystroke rhythms of a user are measured to develop a unique biometric template of
the user's typing pattern for future authentication. Keystrokes are separated into
static and dynamic typing, which are used to help distinguish between authorized
and unauthorized users. Vibration information may be used to create a pattern for
future use in both identification and authentication tasks.
Access Control
Access control is an essential element of security that determines who is allowed to access
certain data, apps, and resources—and in what circumstances. In the same way that keys
and pre-approved guest lists protect physical spaces, access control policies protect digital
spaces. In other words, they let the right people in and keep the wrong people out. Access
control policies rely heavily on techniques like authentication and authorization, which allow
6
organizations to explicitly verify both that users are who they say they are and that these
users are granted the appropriate level of access based on context such as device, location,
role, and much more.
• Passwords. Usernames and passwords are the most common authentication factors.
If a user enters the correct data, the system assumes the identity is valid and grants
access.
• One-time pins. Grant access for only one session or transaction.
• Authentication apps. Generate security codes via an outside party that grants
access.
• Biometrics. A user presents a fingerprint or eye scan to gain access to the system.
In some instances, systems require the successful verification of more than one factor
before granting access. This multi-factor authentication (MFA) requirement is often
deployed to increase security beyond what passwords alone can provide.
7
Authorization in system security is the process of giving the user permission to access a
specific resource or function. This term is often used interchangeably with access control or
client privilege.
In secure environments, authorization must always follow authentication. Users should first
prove that their identities are genuine before an organization’s administrators grant them
access to the requested resources.
Authentication Authorization
What does it do? Verifies credentials Grants or denies permissions
Through passwords, biometrics, Through settings maintained by
How does it work? one-time pins, or apps security teams
Is it visible to the user? Yes No
It is changeable by the
user? Partially No
How does data move? Through ID tokens Through access tokens
In the most basic sense, access control in information security is about determining who
gets access to what stuff (files, directories, applications, etc.). For example, if I access our
company’s file server, I can see documents related to marketing. Someone in our Finance
department, on the other hand, would be able to review financial documents. But someone
external to the company wouldn’t be able to access any of these things.
8
All of these things are possible thanks to access controls that determine who can access
what.
Looking for a more technical definition? Access control is a broad term that describes
policies and methods that ensure only verified individuals can physically or virtually touch
items that they have permission to access. This process involves restricting access or
granting permissions that allow someone to do something to a protected item. This includes
having permissions to do any of the following to protected items (digital or physical
resources):
• Access,
• Read,
• Modify,
• Communicate,
• Delete or otherwise destroy.
“Subjects are usually people or groups. Objects are usually files or directories. The key is,
subjects access objects, and so access controls regulate how subjects access objects.”
In this understanding, objects could be resources that you want to protect from
unauthorized access, use, or disclosure. And the subject is the user (or group of users or
even non-person entities such as applications or services) that the access controls apply to.
So, access controls (in a more technical sense) are the tools, policies, models, and
mechanisms that enable you to grant or restrict access to your organization’s digital or
physical resources. This includes everything from restricting or granting access to specific
files and databases to IT systems and physical locations.
9
An access control matrix is a table that defines access permissions between specific subjects
and objects. A matrix is a data structure that acts as a table lookup for the operating
system. For example, Table above is a matrix that has specific access permissions defined by
user and detailing what actions they can enact.
10
The advantages of using access control lists include:
• Better protection of internet-facing servers.
• More control of access through entry points.
• More control of access to and traffic between internal networks.
• More granular control of user and group permissions.
• Better protection from spoofing and denial of service attacks.
IT auditing or information technology audit basically examines the internal control structure
in information systems set up.
Discretionary access control (DAC) is a type of security access control that grants or
restricts object access via an access policy determined by an object's owner group and/or
subjects. DAC mechanism controls are defined by user identification with supplied
credentials during authentication, such as username and password. DACs are discretionary
because the subject (owner) can transfer authenticated objects or information access to
other users. In other words, the owner determines object access privileges.
11
In DAC, each system object (file or data object) has an owner, and each initial object owner
is the subject that causes its creation. Thus, an object's access policy is determined by its
owner.
A typical example of DAC is Unix file mode, which defines the read, write and execute
permissions in each of the three bits for each user, group and others.
DAC is easy to implement and intuitive but has certain disadvantages, including:
However, MAC requires detailed planning and greater administrative work. You’ll need to
regularly check and update each assignment of access rights to objects and users.
12
Maintenance work also includes adding new data or users and implementing changes in
categorizations and classifications.
13