Exercises on authentication and access control
2021-2022 Demo exam exercise 1 (4 points)
In a company, each employee works in an open space. We need to design proper policies to minimize the risk that passwords get compromised. Such policies will be enforced whenever a user chooses a new password. Also, assume that passwords are only used to access a cloud-based email client over TLS.
- [1 point] What are the main characteristics of a password on which we can act when writing a policy?
- [2 points] What is the most likely attack scenario against passwords considering the above description of the conditions of each employee? Why?
- [1 point] Given the answer provided in point 2, what is the most important characteristic that you need to enforce in the password policy (in order to avoid the attack scenario)?
Question 1
We are designing the password policy for an online banking website. Which of the following rule sets is more adequate in your opinion, and why?
Solution
The first seems stronger, because it enforces long (against bruteforcing), non-reused (against stealing) passwords and mitigates bruteforcing. However, it will lead users to write down passwords.
The second has an additional measure (non dictionary words) that is missing in the previous scheme. Given that guessing is more likely than cracking, and that writing down passwords is a pitfall, this scheme is definitely better with respect to the previous one.
Question 2
Consider biometric authentication.
Solution
It is based on recording features extracted from a biometric characteristic of each user. At each authentication, the measured features are compared with the recorded ones. Each user is thus required to measure the characteristic when a system is deployed.
Solution
Fingerprint scanning and iris recognition are both very precise authentication methods. Fingerprint scanning is slightly easier to fool with counterfeits. Iris recognition is a more invasive procedure which may be less tolerable by users. Additionally, iris recognition is far more costly.
Solution
There are two main issues: false positive (another user with the hand geometry very similar to the legitimate user may be able to authenticate), which may happen if the features are too generic; false negative (the legitimate user may be unable to authenticate), which may happen if the features are too specific
Question 3
Discuss the following statements related to authentication: are they true or false? And why?
Solution
True, because it does not require special equipment, and it is even easier to deploy in many environments.
Solution
True, because the biometric features that they measure (e.g., fingerprints, hand geometry) may change over time, and measurement errors can occur. Thus, they need to be carefully evaluated for false acceptance and false rejection ratios.
Solution
False. Attacks have been developed against biometric systems. For example it is rather easy to duplicate someone's fingerprints.
Solution
True, if the system makes attacking a user the most viable way to access the high value target.
Question 4
Discuss the following statements saying if they are true or false, and give a reason.
Solution
True, because it requires little equipment and set up effort for interfacing. The only significant cost is associated to password/secret code generation (i.e. the cost of the token, or of sending SMS with codes, etc.)
Solution
False, because measurement errors can occur during each authentication phase. Also, the process is non deterministic intrinsically.
Solution
False. In order to evaluate the level of security we need to know more of the system they are designed to protect. Their level of security could be comparable, or either could be a better choice than the other.
Question 5
In a company, each employee has a private office, where only authorized people can enter. The workstation is positioned such that the computer screen faces the wall. Also assume that passwords are only used to access cloud-based services over TLS. We need to design proper policies to minimize the risk that passwords get compromised. Such policies will be enforced whenever a user chooses a new password.
Solution
Complexity = length, rich character set Non guessability = not belonging to dictionaries, not user related Frequency of change
Solution
Guessing, because the office space is confined and accessible only to authorized personnel. Cracking is the second most-likely attack. Snooping is certainly not an option here.
Solution
Against guessing, we must enforce that passwords are not related to the user and, in general, not belonging to dictionaries or common passwords
Question 6
In a company, each employee works in an open space. We need to design proper policies to minimize the risk that passwords get compromised. Such policies will be enforced whenever a user chooses a new password. Also, assume that passwords are only used to access a cloud-based email client over TLS.
Solution
Snooping because the configuration of the space
Solution
Against snooping frequent change is the most important policy
Question 7
What are the differences between MAC and DAC? Make an example of real-world MAC system and at least one example of real-world DAC system.
Solution
Key difference: in DAC owner assigns control over resource, in MAC security admin sets levels.
Example of MAC: classification of secret documents in the military.
Examples of DAC, you name it, any OS.
Question 8
What are the differences between access control lists and capability lists?
Solution
ACLs are efficient with per-object operations, but cannot be used to assign multiple owners to the same object (this can be partially addressed with groups). Capabilities are efficient with per-subject operations, which make them inefficient when objects change frequently.