IAAA (Autosaved)
IAAA (Autosaved)
2
Authentication Cont…
3
3: Authorization
5
4: Accountability
7
IDENTITY LIFECYCLE
8
IDENTITY LIFECYCLE Cont …
11
TYPE 1: SOMETHING YOU KNOW
12
TYPE II: SOMETHING YOU HAVE
13
TYPE III: SOMETHING THAT YOU ARE
(BIOMETRICS)
Retinal scan: which is top of the list, it is the most accurate and it
can even successfully differentiate between identical twins.
Iris scan: which seems similar, but it's quite different from retinal
scan. So iris scans is slightly less accurate compared to retinal scan.
However, there is a cost associated with retina scans because in
retina scans, you have to put your eye really close to the scanner
and then a beam of light enters your eye. This makes the whole
process quite uncomfortable for a lot of users. In contrast, Iris scan
can be done from a few feet away and it is not at all uncomfortable.
So there's always this human tradeoff between these two.
Finger prints: So if you're scanning 4 or more fingers, then your
results would be pretty accurate around ninety nine point nine
percent accurate.
Palm scans: Now this previously referred to the geography of your
palm, but modern palm scanners, they basically capture millions of
data points of your palm veins and they can produce amazingly
accurate results.
Voice pattern: it is traditionally regarded not as accurate as other
type of biometric scans, such as retinal scans.
14
Extra Factors to Consinder
Another factor which you need to consider. Some of these biometrics are
constant throughout your life and some of them change over age.
For example, your voice changes over age, your fingerprints. If you get really
old, they may start to fade.
But your retina scan, for example, is something which never really changes
throughout your life until and unless, you know, if you have any medical problem
which can obviously affect any of these biometrics.
15
MULTIFACTOR AUTHENTICATION
A great tool in the arsenal of cyber security specialists is multifactor
authentication.
So the problem stems from the fact that, if you're just using a password,
you give your username and password to log into a system. So this is
single factor authentication because you're just using the password and
this provides very weak security. Only your password needs to be
compromised in order for the system to be breached.
So this can be alleviated if you use multifactor authentication, which
combines more than one type of authentication. So often we combine
Type-I and Type-II.
So Type-I was something that, you know, for example, your password and
Type-II is something that you have. For example, you have your mobile SIM
card and then you can receive an SMS.
So the way this works is that let's say you're logging into a system, you
provide your username and password, but after providing your password, if
your password is authenticated, the system is going to generate an SMS
and send it to your mobile phone. Now, your SIM is something that you
have and then you need to put in the confirmation code that you receive in
your SMS.
So this provides for two factors and hence the name multifactor
authentication. 16
17
Authorization Basics
1: Need to Know
Need to know is an important concept in
authorization, the basic idea is that you should
always give a subject the minimum amount of data
or information that he or she needs to complete
their job.
This ensures that every subject has got the least
privileges that he or she need to complete the job
duties. It's the fundamental idea in cyber security
to provide least privileges.
18
2: Privilege Creep
19
ACCOUNTABILITY
22
Information Security
23
Components of an Information
System
Informationsystem (IS) is entire set of
software, hardware, data, people,
procedures, and networks necessary to
use information as a resource in the
organization
24
Securing Components
25
Figure 1-5 – Subject and Object of
Attack
26
Balancing Information Security and
Access
Impossibleto obtain perfect security—it is a
process, not an absolute
27
Figure 1-6 – Balancing Security and Access
28
Security and reliability
29
What is privacy?
30
Example: PIPEDA
32
How secure should we make it?
33
Important Terminology in Cyber Security
Assets
Things we might want to protect, such as:
Hardware
Software
Data
Vulnerabilities
Weaknesses in a system that may be able to be exploited in order to cause loss or
harm
e.g., a file server that doesn't authenticate its users
34
Important Terminology in Cyber Security
Threats --a potential cause of an incident that may result in harm to a system or
organization
A loss or harm that might befall a system
e.g., users' personal files may be revealed to the public
There are four major categories of threats:
Interception
Interruption
Modification
Fabrication
When we design a system, we need to state a threat model
This is the set of threats we are undertaking to defend against
Whom do we want to stop from doing what?
35
Important Terminology in Cyber Security
Attack
An action which exploits a vulnerability
e.g., telling the file server you are a different user in an attempt to read or modify their
files
Control
Removing or reducing a vulnerability
You control a vulnerability to prevent an attack and block a threat.
How would you control the file server vulnerability?
Our goal: control vulnerabilities
36
Why Security?
cost
100%
Security level
3
8
Security Attacks - Taxonomy
Property
that is
compromised
3
9
INTERRUPTION
Also known as denial of services.
Information resources (hardware, software and data) are deliberately made
unavailable, lost or unusable, usually through malicious destruction. e.g: cutting a
communication line, disabling a file management system, etc.
4
0
INTERCEPTION
4
1
MODIFICATION
4
2
FABRICATION
4
3
Methods of defence
Often, we'll want to do many things to defend against the same threat
“Defence in depth”
44
Example of defence: Class
exercise
Threat: your laptop may get stolen
How to defend?
Prevent:
Deter:
Deflect:
Detect:
Recover:
45
Example of defence
46
Defence of computer systems
47
Defence of computer systems
Software controls
Passwords and other forms of access control
Operating systems separate users' actions from each
other
Virus scanners watch for some kinds of malware
Development controls enforce quality measures on the
original source code
Personal firewalls that run on your desktop
48
Defence of computer systems
Hardware controls
(Not usually protection of the hardware itself, but rather
using separate hardware to protect the system as a
whole.)
Fingerprint readers
Smart tokens
Firewalls
Intrusion detection systems(IDS)
49
Defence of computer systems
Physical controls
Protection of the hardware itself, as well as physical
access to the console, storage media, etc.
Locks
Guards
Off-site backups
50
Information Security Project
Team
A number of individuals who are experienced in one or more facets of required
technical and nontechnical areas:
Champion
Team leader
Security policy developers
Risk assessment specialists
Security professionals
Systems administrators
End users
51
Defence of Computer Systems
52
Vulnerabilities
53
Principles of Computer Security
Principleof Easiest Penetration
An intruder must be expected to use any
available means of penetration.
The penetration may not necessarily be by the most
obvious means, nor is it necessarily the one against
which the most solid defense has been installed.
55