Nis Unit 2 PDF
Nis Unit 2 PDF
B Page 1
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 2
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 3
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 4
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
3. Password aging: The password can be set with its expiry date. It will force
the users to change their password at regular intervals. It is normally used in
conjunction with a setting to prevent re-use of X number of previous
passwords - the minimum password age is intended to discourage users from
cycling through their previous passwords to get back to a preferred one.
4. Limit login attempts: One of the very common attacks is Brute Force attack.
This basically means that a hacker keeps trying to guess your password until
they get it right. Most of the times, they use a script for this. Limit Login
Attempts allows us to track and limit the number of failed login attempts.
2.1.2 Password attacks
Piggybacking: Piggybacking is a social engineering attack in which an
attacker uses another person’s legitimate access to a physical or electronic
location to gain unauthorized access themselves.
This type of attack is often seen in office buildings, where an attacker will
follow someone with an access badge into a secured area. It can also be seen in IT
systems, where an attacker may log into a system using another user’s credentials.
Piggybacking can also be used as a form of eavesdropping, where an attacker uses
another person’s access to a location in order to listen in on conversations or harvest
B Page 5
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
sensitive information.
Piggybacking attacks are relatively easy to carry out and are often very hard to
detect. However, there are several steps that organizations can take in order to
protect themselves against this type of attack. For example, they can limit access to
sensitive areas only to authorized individuals with proper credentials or set up a
system for detecting unauthorized access attempts.
Overall, piggybacking is a serious security threat that can have serious
consequences for organizations. Therefore, it is important for organizations to be
aware of this type of attack and take measures to protect themselves against it.
Shoulder Surfing: Shoulder surfing is using direct observation techniques,
such as looking over someone’s shoulder, to get information. Shoulder surfing
is an effective way to get information in crowded place because it is relatively
easy to stand next to someone and watch as they fill out a form, enter a pin
number at an ATM machine etc. It can also be done long distance with the aid
of binoculars or other vision-enhancing devices. This attack is the most
successful type of attack against password and some other graphical password.
Dumpster Diving: Getting familiar with the dumpster diving definition is the
first step to fight this attack. Here, cyber attackers take the idiom “One man’s
trash is another man’s treasure” to a whole new realm.
Dumpster diving in cybersecurity is the process of investigating an individual
or organization’s trash to retrieve information that could be used to compromise
network resources or plan a cyberattack.
A person going through your trash can gather enough data to create a complex
profile and commit identity theft. Aside from physical trash, cyber actors can also
access recycle or electronic waste bins, phone list, calendar or organizational chart
B Page 6
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
To prevent dumpster divers from learning any valuable information about a user or
his organization, establish a disposal policy. Ensure all unwanted information,
documents, notes, and hardware is properly destroyed. Below are a few practices to
prevent dumpster diving in cyber security.
B Page 7
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
aims towards establishing one’s identity based on personal traits. Each human being
is unique in terms of characteristics, which make him or her different from all others.
The physical attributes such as finger prints, color of iris, color of hair, hand
geometry, and behavioural characteristics such as tone and accent of speech,
signature, or the way of typing keys of computer keyboard etc., make a person stand
separate from the rest. The biometric sample is acquired from candidate user. The
prominent features are extracted from the sample and it is then compared with all
the samples stored in the database. When the input sample matches with one of the
samples in the database, the biometric system allows the person to access the
resources; otherwise prohibits.
B Page 8
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
The software works by extracting meaningful features known as minutia points from
the fingerprint. The scanner picks out attributes such as orientation, change of ridge
direction, arches, loops and whorls in the print. Some scanners can even pick up
pores on the skin. The software then records and stores these minutia points in order
to verify the user’s identity in the future.
It's limitations:
a. Hardware and software programs can be expensive.
b. It can lead to false rejections and false acceptance.
c. It makes mistakes with dryness or dirty finger’s skin, and well as with age.
➢ Hand Print: Handprint is obtained from the inner surface of a hand between
the wrist and the top of the fingers, which contains the principal lines,
wrinkles and ridges on the palm, finger and fingerprint. As in the case of
finger print, everybody has unique handprints. A handprint Biometric
Systems scan hand and fingers and the data is compared with the specimen
stored for you in the system. The user is allowed or denied based on the result
of this verification.
➢ Retina: Everybody has a unique retinal vascular pattern. Retina Pattern
Biometric system uses an infrared beam to scan your retina. Retina pattern
biometric systems examine the unique characteristics of user’s retina and
compare that information with stored pattern to determine whether user
should be allowed access. Some other biometric systems also perform iris
and pupil measurements. Retina Pattern Biometric Systems are highly
reliable. Users are often worried in using retina scanners because they fear
that retina scanners will blind or injure their eyes.
B Page 9
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 10
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
Of all the biometric modalities in existence, signature recognition carries the most
potential in terms of adaptability, security and implementation. In addition, the costs
involved in the deployment and procurement of this biometric modality are minimal
in contrast to the much more complex modalities like retinal and fingerprint
recognition.
➢ Keystrokes: The behavioural biometric of Keystroke Dynamics uses the
manner and rhythm in which an individual types characters on a keyboard or
keypad. The keystroke rhythms of a user are measured to develop a unique
biometric template of the user's typing pattern for future authentication.
Keystrokes are separated into static and dynamic typing, which are used to
help distinguish between authorized and unauthorized users. Vibration
information may be used to create a pattern for future use in both identification
and authentication tasks.
2.3 Access Control
2.3.1 Definition:
✓ Access is the Ability of a subject to interact with an object. Authentication,
deals with verifying the identity of subject.
✓ Access control is a security technique that controls who can access or use
resources in a network or system.
B Page 11
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
✓ Access control is the ability to specify , to control and to limit the access to
the host system or application in terms of availability, integrity and
confidentiality.
2.3.2 Authentication Mechanism - In security, authentication is the process of
verifying whether someone (or something) is, in fact, who (or what) it is declared
to be.
There are three methods of authentication:
something you know (i.e., passwords)
something you have (i.e. token keys)
something you are (scanned body part, i.e. fingerprint)
2.3.3Authentication and Authorization
Authentication is the act of validating that users are whom they claim to be. This is
the first step in any security process.
Complete an authentication process with:
✓ Passwords. Usernames and passwords are the most common authentication
factors.
✓ Authentication apps. Generate security codes via an outside party that grants
access.
✓ Biometrics. A user presents a fingerprint or eye scan to gain access to the
system.
In some instances, systems require the successful verification of more than
one factor before granting access. This multi-factor authentication (MFA)
requirement is often deployed to increase security beyond what passwords
alone can provide.
B Page 12
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
2.3.4 Principal
B Page 13
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
The purpose od access control is to limit the actions or operations that a legitimate
user of a computer system can perform.
o Users should have only the minimum access rights needed to do their
job.
o Reduces the risk of accidental or intentional misuse.
✓ Separation of Duties
✓ Need to Know
✓ Authorization
B Page 14
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 15
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 16
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 17
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 18
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 19
SHREE KRUSHNA ENGG. CLASSES NETWORK AND INFORMATION SECURITY IS 22620
B Page 20