Chapter-3:
Authentication and Access Control
04/07/2024 Computer and Network Security 1 By: Mechal T.
Outline
Authentication
Authorization
Authentication factors
Authentication techniques
Access control elements
Access control models
04/07/2024 Computer and Network Security 2 By: Mechal T.
Authentication
Authentication is the process of identifying someone's identity
by assuring that the person is the same as what he is claiming
for.
It is used by both server and client.
The server uses authentication when someone wants to access
the information, and the server needs to know who is accessing
the information.
The client uses it when he wants to know that it is the same
server that it claims to be.
04/07/2024 Computer and Network Security 3 By: Mechal T.
Authentication…
The authentication by the server is done mostly by using the
username and password.
Other ways of authentication by the server can also be done
using cards, retina scans, voice recognition, and fingerprints.
Authentication does not ensure what tasks under a process one
person can do, what files he can view, read, or update.
It mostly identifies who the person or system is actually.
04/07/2024 Computer and Network Security 4 By: Mechal T.
Authentication…
Authentication Factors:
As per the security levels and the type of application, there are
different types of Authentication factors:
Single-Factor Authentication
Two-Factor Authentication
Multi-Factor Authentication
04/07/2024 Computer and Network Security 5 By: Mechal T.
Authentication…
1. Single-Factor Authentication
Single-factor authentication is the simplest way of
authentication.
It just needs a username and password to allows a user to access
a system.
04/07/2024 Computer and Network Security 6 By: Mechal T.
Authentication…
2. Two-factor Authentication
As per the name, it is two-level security; hence it needs two-
step verification to authenticate a user.
It does not require only a username and password but also
needs the unique information that only the particular user
knows, such as first school name, a favorite destination.
Apart from this, it can also verify the user by sending the OTP
or a unique link on the user's registered number or email
address.
04/07/2024 Computer and Network Security 7 By: Mechal T.
Authentication…
3. Multi-factor Authentication
This is the most secure and advanced level of authorization.
It requires two or more than two levels of security from
different and independent categories.
This type of authentication is usually used in financial
organizations, banks, and law enforcement agencies.
This ensures to eliminate any data exposer from the third party
or hackers.
04/07/2024 Computer and Network Security 8 By: Mechal T.
Authentication…
Famous Authentication techniques
1. Password-based authentication
It is the simplest way of authentication.
It requires the password for the particular username.
If the password matches with the username and both details
match the system's database, the user will be successfully
authenticated.
04/07/2024 Computer and Network Security 9 By: Mechal T.
Authentication…
Famous Authentication techniques…
2. Passwordless authentication
In this technique, the user doesn't need any password; instead,
he gets an OTP (One-time password) or link on his registered
mobile number or phone number.
It can also be said OTP-based authentication.
04/07/2024 Computer and Network Security 10 By: Mechal T.
Authentication…
Famous Authentication techniques…
3. 2FA/MFA
2FA/MFA or 2-factor authentication/Multi-factor authentication
is the higher level of authentication.
It requires additional PIN or security questions so that it can
authenticate the user.
04/07/2024 Computer and Network Security 11 By: Mechal T.
Authentication…
Famous Authentication techniques…
4. Single Sign-on
Single Sign-on or SSO is a way to enable access to multiple
applications with a single set of credentials.
It allows the user to sign-in once, and it will automatically be
signed in to all other web apps from the same centralized
directory.
04/07/2024 Computer and Network Security 12 By: Mechal T.
Authentication…
Famous Authentication techniques…
5. Social Authentication
Social authentication does not require additional security;
instead, it verifies the user with the existing credentials for the
available social network.
04/07/2024 Computer and Network Security 13 By: Mechal T.
Authorization
Authorization is the process of granting someone to do
something.
It means it a way to check if the user has permission to use a
resource or not.
It defines that what data and information one user can access.
The authorization usually works with authentication so that the
system could know who is accessing the information.
Authorization is not always necessary to access information
available over the internet.
04/07/2024 Computer and Network Security 14 By: Mechal T.
Authentication Authorization
Authentication is the process of identifying a Authorization is the process of giving
user to provide access to a system. permission to access the resources.
In this, the user or client and server are verified. In this, it is verified that if the user is allowed
through the defined policies and rules.
It is usually performed before the authorization. It is usually done once the user is successfully
authenticated.
It requires the login details of the user, such as It requires the user's privilege or security level.
user name & password, etc.
Data is provided through the Token Ids. Data is provided through the access tokens.
Example: Entering Login details is necessary Example: After employees successfully
for the employees to authenticate themselves to authenticate themselves, they can access and
access the organizational emails or software. work on certain functions only as per their roles
and profiles.
Authentication credentials can be partially Authorization permissions cannot be changed by
changed by the user as per the requirement. the user. The permissions are given to a user by
the owner/manager of the system, and he can
only change it.
Access Control
Access Control is the prevention of unauthorized use of a
resource (including the prevention of use of a resource in an
unauthorized manner).
It is the central element of computer security.
Used for boundary protection
Access control permits users and groups:
to authenticate to system
to be assigned access rights to certain resources in the system i.e.
authorized
04/07/2024 Computer and Network Security 16 By: Mechal T.
Access Control Elements
Subject - entity that can access objects
a process representing user/application
often have 3 classes: owner, group, world
Object - access controlled resource
e.g. files, directories, records, programs etc
number/type depend on environment
Access right - way in which subject accesses an object
e.g. read, write, execute, delete, create, search
04/07/2024 Computer and Network Security 17 By: Mechal T.
Access Control Categories
There are two basic categories of access control:
Physical Access Control and
Logical Access Control
04/07/2024 Computer and Network Security 18 By: Mechal T.
Access Control…
Physical access control limits access to campuses, buildings,
rooms and physical IT assets.
Logical access control limits connections to computer networks,
system files and data.
04/07/2024 Computer and Network Security 19 By: Mechal T.
Access Control…
To secure a facility, organizations use electronic access control
systems that rely on user credentials, access card readers,
auditing and reports to track employee access to restricted
business locations and proprietary areas, such as data centers.
Some of these systems incorporate access control panels to
restrict entry to rooms and buildings, as well as alarms and
lockdown capabilities, to prevent unauthorized access or
04/07/2024 Computer and Network Security 20 By: Mechal T.
Why is Access Control Important
The goal of access control is to minimize the security risk of
unauthorized access to physical and logical systems.
Access control is a fundamental component of security
compliance programs that ensures security technology and
access control policies are in place to protect confidential
information, such as customer data.
Most organizations have infrastructure and procedures that limit
access to networks, computer systems, applications, files and
sensitive data, such as personally identifiable information and
04/07/2024 Computer and Network Security 21 By: Mechal T.
Why is Access Control Important…
Access control systems are complex and can be challenging to
manage in dynamic IT environments that involve on-premises
systems and cloud services.
After high-profile breaches, technology vendors have shifted
away from single sign-on systems to unified access
management, which offers access controls for on-premises and
cloud environments.
04/07/2024 Computer and Network Security 22 By: Mechal T.
How Access Control Works
Access controls identify an individual or entity, verify the person
or application is who or what it claims to be, and authorizes the
access level and set of actions associated with the username or IP
address.
Directory services and protocols, including Lightweight Directory
Access Protocol and Security Assertion Markup Language,
provide access controls for authenticating and authorizing users
and entities and enabling them to connect to computer resources,
such as distributed applications and web servers. Organizations
use different access control models depending on their compliance
04/07/2024 Computer and Network Security 23 By: Mechal T.
Access Control Models
The main models of access control are the following:
Mandatory access control (MAC).
Discretionary access control (DAC).
Role-based access control (RBAC).
Rule-based access control (RBAC).
Attribute-based access control.
04/07/2024 Computer and Network Security 24 By: Mechal T.
Access Control Models…
1. Mandatory Access Control
The operating system in MAC will provide access to the user
based on their identities and data.
For gaining access, the user has to submit their personal
information.
It is very secure because the rules and restrictions are imposed
by the admin and will be strictly followed.
MAC settings and policy management will be established in a
secure network and are limited to system administrators.
04/07/2024 Computer and Network Security
25 By: Mechal T.
Access Control Models…
Attributes of MAC
It has tighter security because only the administrator can access
or alter controls. And also it an help to reduce system errors.
MAC has an enforced operating system that can label and
delineate incoming application data.
Maintenance will be difficult because only the administrator can
have access to the database.
Ex: Access level of windows for ordinary users, admins, and
guests are some of the examples of MAC.
04/07/2024 Computer and Network Security
26 By: Mechal T.
Access Control Models…
2. Discretionary Access Control (DAC)
DAC is identity-based access control.
DAC mechanisms will be controlled by user identification such
as username and password.
DAC is discretionary because the owners can transfer objects or
any authenticated information to other users.
In simple words, the owner can determine the access privileges.
04/07/2024 Computer and Network Security 27 By: Mechal T.
Access Control Models…
Attributes of DAC
Users can transfer their object ownership to another user.
The access type of other users can be determined by the user.
Authorization failure can restrict the user access after several
failed attempts.
Unauthorized users will be blind to object characteristics called
file size, directory path, and file name.
Ex: Permitting the Linux file operating system is an example of
DAC.
04/07/2024 Computer and Network Security 28 By: Mechal T.
Access Control Models…
3. Role-based access control (RBAC)
This is a widely used access control mechanism that restricts
access to computer resources based on individuals or groups
with defined business functions.
Ex: executive level, engineer level 1, etc. -- rather than the
identities of individual users.
The role-based security model relies on a complex structure of
role assignments, role authorizations and role permissions
developed using role engineering to regulate employee access
04/07/2024 Computer and Network Security 29 By: Mechal T.
Access Control Models…
4. Rule-based access control
This is a security model in which the system administrator
defines the rules that govern access to resource objects.
These rules are often based on conditions, such as time of day
or location.
It is not uncommon to use some form of both rule-based access
control and RBAC to enforce access policies and procedures.
04/07/2024 Computer and Network Security 30 By: Mechal T.
Access Control Models…
5. Attribute-based access control
This is a methodology that manages access rights by evaluating
a set of rules, policies and relationships using the attributes of
users, systems and environmental conditions.
04/07/2024 Computer and Network Security 31 By: Mechal T.
Implementing Access Control
Access control is integrated into an organization's IT
environment.
It can involve identity management and access management
systems.
These systems provide access control software, a user database
and management tools for access control policies, auditing and
enforcement.
When a user is added to an access management system, system
administrators use an automated provisioning system to set up
04/07/2024 Computer and Network Security 32 By: Mechal T.
Implementing Access Control…
The best practice of least privilege restricts access to only
resources that employees require to perform their immediate job
functions.
04/07/2024 Computer and Network Security 33 By: Mechal T.
Challenges of Access Control…
Many of the challenges of access control rise from the highly
distributed nature of modern IT.
It is difficult to keep track of constantly evolving assets because
they are spread out both physically and logically.
04/07/2024 Computer and Network Security 34 By: Mechal T.
Challenges of Access Control…
Specific examples of challenges include the following:
Dynamically managing distributed IT environments;
Password fatigue;
Compliance visibility through consistent reporting;
Centralizing user directories and avoiding application-specific
classification; and
Data governance and visibility through consistent reporting.
04/07/2024 Computer and Network Security 35 By: Mechal T.
Access Control Software
Many types of access control software and technology exist,
and multiple components are often used together as part of a
larger identity and access management (IAM) strategy.
Software tools may be deployed on premises, in the cloud or
both.
They may focus primarily on a company's internal access
management or outwardly on access management for
04/07/2024 Computer and Network Security 36 By: Mechal T.
Access Control Software…
Types of access management software tools include the
following:
Reporting and monitoring applications
Password management tools
Provisioning tools
Identity repositories
Security policy enforcement tools
Microsoft Active Directory is one example of software that
includes most of the tools listed above in a single offering.
04/07/2024 Computer and Network Security 37 By: Mechal T.
Thank You
04/07/2024 Computer and Network Security By: Mechal T. 38