W4L2 Script
W4L2 Script
Hello! In this lecture we will discuss about system and network security, covering authentication,
access controls, and authorization of system resources followed by some basics of web security
both.
Once can find a vast range of applications that demand authentication security property, staring
Depending on application, the level of checking the legitimacy varies, that is, from single factor
authentication to multi-factor.
- ATM cash withdrawal uses two factors (e.g. Debit Card + PIN).
Access control means the prevention of unauthorized use of a resource, including the prevention
A function to control which (active) subject have access to which (passive) object with some
Here,
Subject: An active entity that requests access to an object or the data in an object.
Controls: The security features that control how users and systems communicate and interact
A structure, known as Access Control Matrix (ACM) is typically used for controlling access
ACM contains all the relevant information on which the authorization decisions can be made.
Bob has read-execute access to System File, read access to Accounts Data and no access to
Insurance Data.
Riya has read-execute access to System File and read-write access to Insurance Data.
Two fundamental concepts used for checking the authorization are Access Control Lists (ACLs)
Access Control List is a table that tells a computer system which access rights each Subject (e.g.
Capability is a token, ticket, or key that gives the Subject permission to access an Object in a
computer system.
The ACL corresponding to the mentioned ACM pertaining to Insurance Data is:
(OS, rx), (Prog., rx), (Acc. Data, r), (Ins. Data, rw)
If we look at the use of ‘ACL vs. C-lists’, the concepts look similar but they provide different
For example,
Whereas,
Capabilities can only name those objects for which a capability is held.
Alice wishes to keep all of her valuables in a safe locker in a bank. She has got consent of the
bank that she may delegate a few of her friends to access the locker.
Bank can follow the following two ways to control access to the Alice’s locker:
ACL approach
- The bank maintains a list of people, friends of Alice, authorized to access the locker.
Capabilities approach
- Alice can ask for the key back from her friend.
The most widely used Access Control notion surrounds with Mandatory Access Control (MAC),
them.
Mandatory Access Control (MAC) refers to system mechanism that controls access to object
MAC.
Importantly, if such strict access is relaxed then what adjustment can be done with respect to the
Discretionary Access Control (DAC) refers to individual’s access control mechanism that
For example, initially the access to a file was having READ (r), later the owner of the file
changed the access to the file as READ, WRITE and EXECUTE (rwx) moreover, one can also
delegate his or her access rights to other, can apply discretionary power for controlling access to
system resources. All modern Operating systems are governed by both MAC and DAC.
Another practical access control model is Role based Access Control (RBAC), where a Role is
defined for individual(s) and resource sharing/controlling is done with the Role. Modern
For example, librarian is a role that can be assigned to the designate person who can have all
Generally speaking, when we think about network security, it brings many things into context,
namely, channel security, protocol security, attacker’s capability, perimeter security, and so on.
For instance, when we run application on a web server, the application may:
- interact with the other server (e.g. authentication server, database server)
Many applications can be found that follow the above working principles such as Online
A type of malicious exploit having trust that a website in a user’s browser (whereby
A type of malicious exploits having trust that a user for a particular website.
Insecure storage
Let us illustrate a scenario to show how such vulnerabilities can pose serious threats to
applications.
- Suppose Alice is browsing a social networking page where another user, say Eve, has
posted a message.
- Suppose that Eve has crafted an HTML image that executes an action on Alice’s bank’s
For example, Eve: Hello Alice! Click here for an interesting Image:
<img src=https://www.mybank.com/intended-goal...>
- If Alice’s bank keeps her authentication information in a cookie, and if the cookie hasn’t
expired, then the attempt by Alice’s browser to load the image will submit the withdrawal
form with her cookie, thus authorizing a transaction without Alice’s approval.
● Eve must target either a site that doesn’t check the referrer header.
(a link or script in a page that accesses a site to which the user is known and have been
authenticated)
● Eve must find a form submission at the target site, or a URL that has side effects, that
● Eve must determine the correct values for all the forms or URL inputs.
● Eve must lure the victim to a Web page with malicious code while the victim is logged
Attacker could be Outsider: Outsider attacker can attempt to attack the system, application
Outside attacker typically gathers information about the network asset before launching any
attack.
Moreover, attacker could be passive (who can perform only READ operation), that is, listen,
Similarly, attacker could be active (who can perform READ, WRITE, EXECUTE operation),
Now, coming to the point of different types of network, say wired or wireless; topology of
network; capacity of network etc. One should be familiar with many attributes with respect to
channel security, as there may not be any defined doors while using Internet for safeguarding
However, we can put a bit more emphasis on wireless networks, which found enormous usage in
- sending and receiving messages do not need physical access to the network infrastructure
Broadcast communications
Concerns
- eavesdropping.
- denial of service.
IEEE 802.11i is the standard/specification widely used for security mechanism of wireless
networks.
Wireless Fidelity (WiFi) consists of three main components as defined below:
Station (Client): client device (e.g. laptop) that wants to associate to the WLAN. The term
‘Supplicant’ is also used interchangeably to refer to the software running on the client that
Access Point: A network device (e.g. access point) which authenticates client. Access point is
wireless network card can identify the network. A connection request-response can decide
The security part comes while gaining access to the network, which may be checked through one
◦Confidentiality: RC4
◦Integrity: CRC32
WPA (Wi-Fi Protected Access)
◦Authentication: 802.1x
◦Integrity: MIC
One can classify WEP access control (refer to the slide) with two broad classes:
- Authentication (Open/Protected)
The protected access control follows a 4-way challenge-response protocol with shared key based
authentication and integrity check.
4. Access point Decrypts and compare response with the challenge it sent
We should note that WEP suffers from security weakness and should not be advisable for
One may refer to “N. Borisov, I. Goldberg, and D. Wagner. Intercepting Mobile
Communications: The Insecurity of 802.11. In Proc. of Mobicom, 2001” for knowing more on
In case of WiFi protected access (WPA), which is more secure than WEP, there are two options
WPA2: RSN/AES-CCMP
Indeed, WPA2 performs better than WPA.
However, it is important to note that the selection (whether Open, WEP, WPA, or WPA2) lies on
One can get the default setting, but that may not be adequate to handle the application with
respect to its intended security goals. So, it is advisable to check the network setting of wireless
networks once someone starts using the network, and can always re-configure as per need.
The authenticator becomes the intermediary for relaying EAP (Extensible Authentication
Authentication Server.
Finally, perimeter security is an important defense for securing enterprise network. The tasks of
The logical components associated with IDS by which it detects incidents are:
It is important to note that having some sort of familiarity in network security, helps in handling
malicious intent while using various applications with a communication channel. The network
security domain involves a lot of security & privacy challenges that one has to handle with care.
There are many active research problems pertaining to this domain which one may take as an
exercise for further study in this domain. For e.g. social networking, cloud security & internet of
things.