Exam Essentials: Chapter 14

Chapter 14: Controlling & Monitoring Access

Identify common authorisation mechanisms

  • Authorisation ensures that the requested activity or object access is possible, given the privileges assigned to the authenticated activity.
  • For example, it ensures that users with appropriate privileges can access files & other resources.
  • Common authorisation mechanisms include:
    • implicit deny
    • access control lists
    • access control matrixes
    • capability tables
    • constrained interfaces
    • content-dependent controls
    • context-dependent controls
  • These mechanisms enforce security principles, need-to-know and separation of duties.

Know details about each of the access control models

  • With Discretionary Access Control (DAC) models, all objects have owners, and the owners can modify permissions.
  • Administrators centrally manage non-discretionary controls.
  • Role-Based Access Control (RBAC) models use task-based roles; users gain privileges when administrators place their accounts into a role.
  • Rule-based access control models use a set of rules, restrictions or filters to determine access.
  • The Mandatory Access Control (MAC) model uses labels to identify security domains. Subject need matching labels to access objects

Understand basic risk elements

  • Risk is the possibility or likelihood that a threat can exploit a vulnerability and cause damage to assets.
  • Asset valuation identifies the value of assets.
  • Threat modelling identifies threats against those assets.
  • Vulnerability analysis identifies weaknesses in an organisation’s valuable assets.
  • Access aggregation is a type of attack that combines (or aggregates) non-sensitive information to learn sensitive information, and is used in reconnaissance attacks.

Know how brute-force & dictionary attacks work

  • Brute-force and dictionary attacks are carried out against a stolen password database file or the logon prompt of a system. They are designed to discover passwords.
  • In brute-force attacks, all possible combinations of keyboard characters are used, whereas a predefined list of possible passwords is used in a dictionary attack.
  • Account lockout controls prevent their effectiveness against online attacks.

Understand the need for strong passwords

  • Strong passwords make password-cracking utilities less successful.
  • Strong passwords include multiple character types and are not words contained in a dictionary.
  • Password policies ensure that users create strong passwords.
  • Passwords should be encrypted when stored, and encrypted when sent over a network.
  • Authentication can be strengthened by using an additional factor beyond just passwords.

Understand how salt & pepper thwarts password attacks

  • Salts add additional bits to a password before hashing it, and help thwart rainbow table attacks.
  • Some algorithms, such as bcrypt and PBKDF2 (Password-Based Key Derivation Function 2) add the salt and repeat the hashing functions many times.
  • Salts are stored in the same DB as the hashed password.
  • A pepper is a large constant number used to further increase the security of the hashed password, and it is stored somewhere outside the database holding the hashed passwords.

Understand sniffer attacks

  • In a sniffer (or snooping) attack, an attacker uses a packet-capturing tool (such as a sniffer or protocol analyser) to capture, analyse and read data sent over a network.
  • Attackers can easily read data sent over a network in cleartext, but encrypting data in transit thwarts this type of attack.

Understand spoofing attacks

  • Spoofing is pretending to be something or someone else, and it is used in many types of attacks, including access control attacks.
  • Attackers often try to obtain the credentials of users so they can spoof the user’s identity. Spoofing attacks include email spoofing, phone number spoofing and IP spoofing.
  • Many phishing attacks use spoofing methods.

Understand social engineering

  • A social engineering attack is an attempt by an attacker to convince someone to provide information (such as a password) or perform an action they wouldn’t normally perform (such as clicking on a malicious link), resulting in a security compromise.
  • Social engineers often try to gain access to the IT infrastructure or the physical facility.
  • User education is an effective tool to prevent the success of social engineering attacks.

Understand phishing

  • Phishing attacks are commonly used to try to trick users into giving up personal information (such as user accounts & passwords), click a malicious link, or open a malicious attachment.
  • Spear phishing target specific groups of users, and whaling targets high-level executives.
  • Vishing uses VoIP techologies.

Leave a comment

Design a site like this with WordPress.com
Get started