Lesson 7: Implementing Authentication Controls
Lesson 7: Implementing Authentication Controls
Lesson 7: Implementing Authentication Controls
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Syllabus Objectives Covered
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Identity and Access Management
• Subjects
• Users or software that request access
• Objects
• Resources such as networks, servers, and data
• Identification
• Associating a valid subject with a computer/network account
• Authentication
• Challenge to the subject to supply a credential to operate the account
• Authorization
• Rights, permissions, or privileges assigned to the account
• Accounting
• Auditing use of the account
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Authentication Factors
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Authentication Design
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Multifactor Authentication
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Authentication Attributes
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Topic 7B
Implement Knowledge-based Authentication
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Syllabus Objectives Covered
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Local , Network, and Remote Authentication
• Authentication providers
• Passwords versus password hashes
• Windows authentication
• Local sign-in
• Network sign-in (Kerberos and NTLM)
• Remote sign-in
• Linux authentication
• /etc/passwd and /etc/shadow
• Pluggable authentication modules (PAMs)
• Single sign-on (SSO)
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Kerberos Authentication
• Single sign-on
authentication and
authorization provider
• Clients
• Application servers
• Key Distribution Center
(KDC)
• Authentication Service –
Ticket Granting Ticket
• Ticket Granting Service –
Service Ticket Images © 123rf.com.
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Kerberos Authorization
Images © 123rf.com.
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
PAP, CHAP, and MS-CHAP Authentication
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Password Attacks
• Plaintext/unencrypted
• Sniffing passwords from unsecure protocols
• Locating passwords in documents/code repositories
• Online password attack
• Adversary interacts with authentication service
• Restrict logon rates
• Shun suspect hosts
• Horizontal brute force/password spraying
• Offline attacks
• Password database
• Hash transmitted directly
• Hash used as key to sign an HMAC
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Brute Force and Dictionary Attacks
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Password Crackers
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Authentication Management
• Hardware and software solutions for storing and submitting multiple user
passwords
• Password key
• USB token
• Possibly Bluetooth/NFC connectivity
• Password vaults
• Software-based
• Federal Information Processing standard (FIPS 140-2)
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Topic 7C
Implement Authentication Technologies
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Syllabus Objectives Covered
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Smart Card Authentication
Image © 123RF.com.
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Key Management Devices
• Provision keys with risk of insider threat
reduced
• Smart cards and USB keys
• Trusted Platform Module (TPM)
• Virtual smart cards
• Hardware Security Module (HSM)
• Provision keys to devices across the
network
• Key archive and escrow
• Reduced attack surface and tamper-evident
• Cryptographically secure pseudorandom
Images © 123RF.com.
number generator (CSPRNG)
• Plug-in card and network rack form factors
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Extensible Authentication Protocol/IEEE 802.1X
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Remote Authentication Dial-in User Service
Images © 123RF.com. 24
Terminal Access Controller Access-Control System
• TACACS+
• Centralizing administrative logins for network appliances
• Reliable TCP transport (over port 49)
• Data encryption
• Discrete authentication, authorization, and accounting functions
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Token Keys and Static Codes
Image © 123RF.com.
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Open Authentication (OATH)
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
2-Step Verification
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28
Topic 7D
Summarize Biometrics Authentication Concepts
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 29
Syllabus Objectives Covered
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 30
Biometric Authentication
• Enrollment
• Sensor and feature extraction
• Efficacy rates and considerations
• False Rejection Rate (FRR) or Type I error
• False Acceptance Rate (FAR) or Type II error
• Crossover Error Rate (CER)
• Throughput (speed)
• Failure to Enrol Rate (FER)
• Cost/implementation
• Privacy concerns
• Accessibility concerns
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 31
Fingerprint Recognition
• Fingerprint sensors
• Small capacitive cells
• Easy to implement
• Relatively simple enrollment
• Quite vulnerable to spoofing
• Vein matching (vascular
biometrics)
• More complex scanner
Android is a
trademark of
Google LLC.
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 32
Facial Recognition
• Facial recognition
• Enrollment can be relatively slow
• Privacy issues
• Prone to relatively high false
acceptance/rejection rates/spoofing
• Retinal scan
• Pattern of blood vessels
• Scanning relatively intrusive and complex
Photo by Ghost Presenter on Unsplash.
• Iris scan
• Pattern of eye surface
• Easier to scan
• More vulnerable to spoofing
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 33
Behavioral Technologies
• Something you do
• Voice recognition
• Gait analysis
• Signature recognition
• Typing
• Other uses than authentication
• Identification/alerting
• Continuous authentication/account locking
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 34
Lesson 7
Summary
CompTIA Security+ Lesson 7 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 35