Page 29 - StudyBook.pdf
P. 29

General Security Concepts: Access Control, Authentication, and Auditing • Chapter 1  13

                 highly complex and secure methods, which may involve higher costs and more
                 time, or can be very simple. For example, if someone you personally know comes
                 to your door, you visually recognize them, and if you want them to enter, you
                 open the door. In this case, you have performed the authentication process through
                 your visual recognition of the individual.All authentication processes follow this
                 same basic premise; that we need to prove who we are or who the individual, ser-
                 vice, or process is before we allow them to use our resources.
                    Authentication allows a sender and receiver of information to validate each
                 other as the appropriate entities with which they want to work. If entities wishing
                 to communicate cannot properly authenticate each other, there can be no trust in
                 the activities or information provided by either party. Only through a trusted and
                 secure method of authentication can administrators provide for a trusted and secure
                 communication or activity.
                    The simplest form of authentication is the transmission of a shared password
                 between entities wishing to authenticate each other.This can be as simple as a
                 secret handshake or a key.As with all simple forms of protection, once knowledge
                 of the secret key or handshake is disclosed to non-trusted parties, there can no
                 longer be trust in who is using the secrets.
                    Many methods can be used by an unauthorized person to acquire a secret key,
                 from tricking someone into disclosing it, to high-tech monitoring of communica-
                 tions between parties to intercept the key as it is passed between parties. However
                 the code is acquired, once it is in a non-trusted party’s hands, it can be used to
                 falsely authenticate and identify someone as a valid party, forging false communica-
                 tions or utilizing the user’s access to gain permissions to the available resources.
                    Original digital authentication systems shared a secret key across the network
                 with the entity with which they wanted to authenticate.Applications such as Telnet
                 and FTP are examples of programs that simply transmit the username and password
                 in cleartext to the party they are authenticating.Another area of concern is Post
                 Office Protocol 3 (POP3) e-mail, which, in its default state, sends the complete
                 username and password information in cleartext, with no protection.
                    The problem with this method of authentication is that anyone that monitors a
                 network can possibly capture a secret key and use it to gain access to the services
                 or to attempt to gain higher privileged access with your stolen authentication
                 information.
                    What methods can be used to provide a stronger defense? As discussed previ-
                 ously, sharing a handshake or secret key does not provide long lasting and secure
                 communication or the secure exchange of authentication information.This has led
                 to more secure methods of protection of authentication mechanisms.The following



                                                                              www.syngress.com
   24   25   26   27   28   29   30   31   32   33   34