You are on page 1of 6

LESSON 5 SOMETHING A SUPPLICANT IS OR CAN

PRODUCE - This authentication factor depends


ACCESS CONTROL - is the process through
on individual features such as fingerprints, palm
which systems decide when and how a person
prints, hand topography, hand anatomy, or
can be allowed into an organization's protected
retina and iris scans, or something that a
area. Access control is accomplished by a blend
supplicant may generate on demand, such as
of laws, services, and technologies. Access
speech patterns, signatures, or kinetic
controls can be compulsory, nondiscretionary,
measurements on the keyboard. Any of those
or optional.
apps, collectively known as biometrics.
IDENTIFICATION – is a process through which
Logical Access Controls - are methods and
unverified entity called supplicant who wants
procedures used in computer information
access to a resource sets out a mark through
systems to define, authenticate, approve and
which the system recognizes them. Each
assume responsibility. Logical access is often
supplicant has unique label called ID, which is
necessary for remote hardware access, and is
used to track one part within the security range.
often compared with the term "physical
AUTHENTICATION – is the mechanism by which access". Logical access controls implement
a supposed identify of a supplicant is confirmed. mechanisms for access control of systems,
services, procedures, and information. The
ACCOUNTABILITY – Means that an controls may be built into operating systems,
authenticated identity can be traced to all software, add-on security products, or
activities on a system whether authorized or management systems for database and
unauthorized. Accountability is most commonly telecommunication. Solutions for Logical Access
done by machine reports and database papers, Control may include Biometrics, Tokens,
and the auditing of these documents. Systems Passwords, and Single Sign-on.
logs document relevant information, such as
failed attempts to login, and system changes. Biometric Access Controls - is focused over the
use of some observable human characteristic or
SOMETHING A SUPPLICANT KNOWS – This attribute to verify the identity of a potential
authentication factor is dependent on what user (a supplicant) of the systems. Fingerprint
petitioners knows and call recall – for example, comparison, Palm print comparison, Hand
a password, passphrase, or other special geometry, Facial recognition, Retinal print
authentication code such PIN. comparison are useful biometric authentication
SOMETHING A SUPPLICANT HAS – this element tools.
of authentication is based on something which a Minutiae - are unique point of reference in
supplicant has and can produce when one’s biometric that is stored as image to be
appropriate. For example, card such as ID cards verified upon a requested access. Each single
or ATM with magnetic strips containing the attempt at access results in a calculation that is
digital (and sometimes encrypted) user PIN, compared to the encoded value to decide if the
compared to the number of user inputs. The consumer is who he or she claims to be. A
smart card incorporates a computer chip concern with this approach is that is changes as
capable of checking and validating a variety of our body develops over time. For authentication
pieces of information rather than just a PIN. during a transaction, retail stores use signature
capture. The customer shall sign a digital tab
with a special pen recording the signature. The
signature will be stored for future reference, or KERBEROS INTERACTING SERVICES
compared for validation to a signature on a
AUTHENTICATION SERVER (AS) - Kerberos
database. Voice recognition operates in a
server that authenticates clients and servers
similar manner by recording the user 's initial
voiceprint reciting a word. Later, the KEY DISTRIBUTION CENTER (KDC) - generates
authentication mechanism allows the user to and issues session keys
utter the same phrase when the user tries to
access the device so that the algorithm can KERBEROS TICKET GRANTING SERVICES(TGS) -
match the actual voiceprint to the stored value. provides tickets to clients who request services

EFFECTIVENESS OF BIOMETRICS - Biometrics KERBEROS IS BASED ON THE LOGIC OF THE


are assessed using parameters such as; the false FOLLOWING PRINCIPLES;
rejection rate, which is the rate of supplicants 1. The KDC is aware of the hidden keys of both
who are in fact approved users but who are network clients and servers. Through using
denied access; False acceptance rate, which is these hidden keys, the KDC initially shares
the percentage of users who are unauthorized information with the client and the server.
users but are allowed access; and third, the
crossover error rate, which is the amount at 2. By providing temporary session keys for
which the number of false dismissals is equal to communication between the client and KDC,
the false acceptances. the server and KDC, and the client and server,
Kerberos authenticates a client through a
Authentication Types: requested service on a server via TGS.
-Knowledge something you know Communications between the client and the
server are then made using these temporary
-Ownership something you have session keys.
-Characteristics | Something unique to you LESSON 5.2
-Location somewhere you are SECURITY AUDIT - is a comprehensive
assessment of a business's information system
-Action something you do/ how you do it
security by evaluating how well it follows a set
AUTHENTICATING WITH KERBEROS AND of defined requirements. A comprehensive
SESAME -Kerberos was named after the Greek audit usually reviews the protection of the
mythology which uses symmetric key physical configuration and environment,
encryption to authorize an individual user with applications, processes of information
specific network resources. Kerberos maintains processing, and user practices in the system.
a data repository that contains system’s private Security assessments are also used to assess
keys. Network services operate on servers in regulatory enforcement despite legislation
the Kerberos network registry, as do the clients outlining how information needs to be treated
using those services. Such private keys are by organizations.
referred to the Kerberos program and can check
Security audits assess efficiency of an
a host to another
information system against a set of criteria. On
the other hand, a vulnerability evaluation
requires a systematic analysis of a whole
information system, searching for possible CRYPTOPOLOGY - is characterized as the
security vulnerabilities. method of having communications inaccessible
to all individuals excluding those who have the
Penetration testing is a secret activity in which
ability to read and interpret it. There are two
a security specialist attempts a variety of attacks
portions that is being studied in Cryptology.
to determine whether or not a device will
First the CRYPTOPGRAPHY that involves the
survive a malicious hacker's same types of
confidentiality program and its structure itself,
attacks. Each of the approaches has inherent
and second CRYPTANALYSIS which is associated
strengths, and using two or more of them in
with breaking the above-mentioned system of
conjunction may be the most effective approach
anonymity.
of all.
CODE - A compilation of knowledge enabling
terms to be transferred to symbols or other
SECURITY CYCLE phrases. Banana can be a code for gun.
However, this isn't some kind of cryptography
that can be evaluated. The only means a
message can be decrypted is by having the
terms set and their codes.

PLAINTEXT is the meaning you wish to convey


in a coded form. Plain text is generally written
without spaces in any lower-case letter. There
are figures printed out, and the punctuation is
overlooked. It is also referred to as clear.

KEY refers to data that enables us to encode the


SECURITY MONITORING FOR COMPUTER plaintext and decode the ciphertext as well.
SYSTEMS SECURITY MONITORING FOR
Monoalphabetic and Polyalphabetic Cipher
COMPUTER SYSTEMS MAY BE IDENTIFIED
BASED TO THE INFORMATION IT CAPTURES Monoalphabetic cipher is a substitution cipher
NAMELY; in which for a given key, the cipher alphabet for
each plain alphabet is fixed throughout the
1. Real-time Monitoring- this focuses on the
encryption process. For example, if ‘A’ is
Host IDS, System Integrity Monitoring and Data
encrypted as ‘D', for any number of occurrences
Loss Prevention.
in that plaintext, ‘A’ will always get encrypted to
2. non-real-time Monitoring- it checks ‘D’. All of the ciphers above are
application and system logging. monoalphabetic; these ciphers are highly
susceptible to cryptanalysis. Polyalphabetic
3. Log Activities- this monitor host-based Cipher is a substitution cipher in which the
activities and networks and its devices. With cipher alphabet for the plain alphabet may be
regards to Log Activities, Event Logs, Access different at different places during the
Logs, Security Logs, Audit Logs are basically encryption process.
involved.
THE ADDITIVE (OR SHIFT) CIPHER SYSTEM A network-based firewall is implemented at a
specific point in the network path and protects
Increasing plaintext character is substituted in
all computers on the “internal” side of the
the Additive Cipher method by another
firewall from all computers on the external side
character whose location in the alphabet is a
of the firewall.
certain number of units apart. In reality we
move a certain number of places over each ADVANTAGES OF FIREWALLS
letter. One of the first additive ciphers was used
Concentration of security - All modified
by Julius Caesar around 50 B.C. Each letter of
software and logging is located on the firewall
the alphabet was replaced by the third letter
system as opposed to being distributed to
following it. So, ais replaced by D, bis replaced
multiple hosts.
by E, c is replaced by F, and so on. The problem
comes when we get to x. x is the 24th letter of Protocol filtering - where the firewalls filters
the alphabet. If we add 3 to 24, we get 27. So, protocols and services that are either not
we go back to the beginning of the alphabet and necessary or that cannot be adequately secured
replace x with A, y with B, and z with c. So, once from exploitation.
we ad, if the number is greater than 26, we
subtract 26 from it. The chart shows each letter Information hiding - n which a firewall can hide
in plaintext and its corresponding letter in names of internal systems (or) electronic mail
cipher text. addresses, thereby revealing less information to
outside hosts.
LESSON 6
Application gateways - where the firewalls
FIREWALL is defined by Khandal, et al (2018) as require inside or outside users to connect first
a program or network devices that filters the to the firewall before connecting further,
information coming through the internet thereby are filtering the protocol.
connection into your private network or
computer system. DISADVANTAGES OF FIREWALLS

These are often categorized as either “network- The most obvious being that certain types of
based firewalls or host-based firewalls network access maybe hampered or even
blocked for some hosts, including telnet, FTP,
Network firewalls run on network hardware NFS, etc. A second disadvantages with a firewall
and filter traffic between two or more system is that it concentrates security in one
networks. spot as opposed to distributing it among
systems, thus a compromised of the firewall
Host-based firewalls, on the other hand, run on
could be disastrous to other less protected
host computers and control network traffic
systems on the subnet. Example: If someone
coming in and out of those machines.
attacks the security guard, the organization
DIFFERENCE BETWEEN NETWORK-BASED AND faces more risks.
HOST-BASED FIREWALL
THE ROLE OF FIREWALLS - A firewall is a term
A host-based firewall is installed on the used for a barrier between a network of
individual computer to protect it from activity machines and users that operate under a
occurring on its network. common security policy and generally trust
each other and the outside world. There are
two basic reasons for using a firewall at present.
(1) to save money in concentrating your security •The system must initially assign a password to
on a small number of components, and its users.

(2) to simplify the architecture of a system by • Periodic update of users’ password.


restricting access only to machines that trust
• The system must maintain a “password
each other.
database”.
Three (3) Design Goals of FIREWALLS - The first
• Users must remember their passwords.
design goal for a firewall is that collectively the
sum of the entire network from internal to • During authentication time, users must enter
external must go through the firewall physically their passwords into the system.
cutting off all access to the local network except
via firewall. • Employees should “…not disclose their
passwords to anyone including the
AUTHENTICATION is the process of reliably administrators and IT managers.”
verifying the identity of someone (or
something) AUTHENTICATION IDENTIFICATION Computers
also verify the identity of its users, based on
THERE are lots of examples of authentication three (3) methods:
in human interaction.
• What you know (e.g., passwords)
1. We recognize each other’s' faces when we
meet. • What you have (e.g., keycards)

2. We recognize each other’s voices on the • What you are (e.g., biometric information)
telephone. VERIFICATION VALIDATION OF INFORMATION
3. We are authenticated by the customs official SUPPLIED AGAINST A TABLE OF POSSIBLE
who checks us against the picture on our VALUES BASED ON USERS CLAIMED IDENTITY,
passport. VERIFY IDENTITY BASED ON YOUR PHYSICAL
CHARACTERISTICS, KNOWN AS BIOMETRICS.
4. a guard might authenticate you by comparing CHARACTERISTICS USED INCLUDE:
you with the picture on your badge.
 Signature

 Fingerprint, hand geometry face or body


5. A mail order company might accept as profile
authentication the fact that you know the
expiration date on your credit card  Speech, retina patter

CREATING A GOOD QUALITY PASSWORD HOW AUTHENTICATION IS DONE DEPENDS ON


POLICY The security provided by a password CAPABILITIES OF ENTITY BEING
system depends on the ability of the users to AUTHENTICATED. TWO MOST IMPORTANT
keep their password or pass code unique and CAPABILITIES:
secured at all time Thus, according to Gupta • Ability to store a high-quality key.
(2018), “…a password is vulnerable to
compromise whenever it is used, stored, or • Ability to perform cryptographic operations
even known.”
TYPES OF AUTHENTICATION • If a user can be induced to run a Trojan horse
which mimics the login program then, the
1. Password-based authentication
Trojan can capture the user’s password.
• Authenticating oneself by showing a secret
• The password can then be sent to the author
password to the remote peer (and to the
of the Trojan
network).
3. On-Line Guessing
• Always vulnerable to eaves dropping attack.
• I can impersonate you if I can guess your
-Usual protection: limit frequency of incorrect
password.
password entries.
• Some systems enforce easily guessable
2. Address-based authentication
passwords.
• Authenticating oneself, can be done “by using
• Some people use easily guessable passwords.
a physically-secured terminal/computer.”
Conceptually similar to password-based • With enough guesses even obscure passwords
authentication. can be guessed.

3. Cryptography-based authentication • Executing users who get their password wrong


would probably be unacceptable. Can make
• Authenticating oneself by showing evidence
sure that guesses have to be typed
of a secret key to the remote peer (and to the
network) but without exposing the secret to the 4. Locking Accounts
peer (or to the network).Secret key can be
• Can lock accounts after too many failed
obtained from a password.
attempts.
PROBLEMS WITH PASSWORDS
• But then easy for someone to deny access.
1. Eavesdropping
• Can cut-off connection after a number of
• Passwords must be uttered to be used. failed attempts and require it to be re-
established.
• Most people don't watch.  But they are not
the people you are worried about. • Can have system response be very slow.

• Wire tapping is a more sophisticated problem. 5. Offline Password Guessing


• If the password is sent from across a network
• Passwords are more vulnerable if off-line
then eavesdropping is possible.
guessing is possible.
• For example, a traditional telnet connection is
• Offline attack- an intruder captures a quantity
unsecured
that is derived from password.
• no cryptography; so an attacker who can
• Attacker then takes their time trying to
eavesdrop, e.g., on the port in use, simply gets
compute password.
to see the password

2. Trojan Horses - is a useful, or apparently


useful, program, which also performs
unwanted/ harmful functions. 79

You might also like