What are the three common techniques for verifying a persons identity and access privileges?

Security Standards and Services

Naomi J. Alpern, Robert J. Shimonski, in Eleventh Hour Network+, 2010

Terminal Access Controller Access Control System/Terminal Access Controller Access Control System Plus

Terminal access controller access control system (TACACS) is used in authenticating remote users. TACACS has gone through three major “generations”:

TACACS TACACS was first developed during the days of Advanced Research Projects Agency Network (ARPANET), and it offers authentication and authorization, but it does not offer any accounting tools.

Terminal Access Controller Access-Control System Plus (TACACS+) TACACS+ is a Cisco proprietary version of TACACS that is incompatible with previous versions. TACACS+ uses individual databases for each. TACACS+ was the first revision to offer secure communications between the TACACS+ client and the TACACS+ server. Vulnerabilities and attacks common with TACACS+ are as follows:

The encryption used in TACACS+ is based on a shared secret that is rarely changed, so a compromise at any point would ultimately expose future compromises.

Birthday attacks The pool of TACACS+ session IDs is not very large; therefore, it is reasonable that two users could have the same session ID.

Buffer overflow Like RADIUS, TACACS+ can fall victim to buffer-overflow attacks.

Packet sniffing The length of passwords can be easily determined by “sniffing” a network.

Lack of integrity checking An attacker can alter accounting records during transmission because the accounting data is not encrypted during transport.

EXAM WARNING

Make sure you understand the difference between TACACS and TACACS+. The most important thing to remember is that TACACS uses UDP as its transport protocol, whereas TACACS+ uses TCP. Also, TACACS+ is a proprietary version owned by Cisco.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597494281000084

Domain 5: Identity and Access Management (Controlling Access and Managing Identity)

Eric Conrad, ... Joshua Feldman, in CISSP Study Guide (Third Edition), 2016

TACACS and TACACS+

The Terminal Access Controller Access Control System (TACACS) is a centralized access control system that requires users to send an ID and static (reusable) password for authentication. TACACS uses UDP port 49 (and may also use TCP). Reusable passwords are a vulnerability: the improved TACACS+ provides better password protection by allowing two-factor strong authentication.

It is important to note that TACACS+ is not backwards compatible with TACACS. TACACS+ uses TCP port 49 for authentication with the TACACS+ server. The actual function of authentication is very similar to RADIUS, but there are some key differences.

RADIUS only encrypts the password (leaving other data, such as username, unencrypted). TACACS+, on the other hand, encrypts all data below the TACACS+ header. This is an improvement over RADIUS and is more secure.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128024379000060

Property Management

Lawrence J. Fennelly CPOI, CSSI, CHL-III, CSSP-1, Marianna A. Perry M.S., CPP, CSSP-1, in Physical Security: 150 Things You Should Know (Second Edition), 2017

18 The Security/Protection Officer and Technology Tools: Electronic Access

An EAC system is ideally used as a part of a fully integrated facility management system. In such a system, EAC is interfaced and integrated with fire safety/life safety systems, video surveillance systems (CCTV), communications systems, and nonsecurity systems such as HVAC.

In an integrated system, EAC systems allow users to be accessed into various areas or limited areas. They can track access and provide attendance records. As a safety feature and for emergency response situations, they can determine where persons are located in facilities. In general, EAC systems are very flexible and strides in technology are making them even more so.

This section barely covers all that you need to know about EAC. The best way to learn about EAC is to actually work with EAC systems, take advantage of every opportunity to work with EAC systems, seek assignments where EAC systems are used, as well as ask questions from control room operators, your supervisors, and EAC vendors and service technicians. There are many excellent sources where you can read about EAC and related systems.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128094877000012

Foundational Security and Access Control Concepts

Thomas L. Norman CPP/PSP, in Electronic Access Control (Second Edition), 2017

Chapter Overview

Access control systems are electronic systems that facilitate automated approval for authorized personnel to enter through a security portal without the need for a security officer to review and validate the authorization of the person entering the portal, typically by using a credential to present to the system to verify their authorization. A security portal is a door or passageway that creates an entry point in a security boundary. Common security portals include standard doors (such as shown in Fig. 2.1 using an HID Global Corporation reader), vestibules, revolving doors, and vehicle entry barriers.

What are the three common techniques for verifying a persons identity and access privileges?

Figure 2.1. Access control portal.

Photo by HID Global Corporation.

Access control systems are an important part of an overall security program that is designed to deter and reduce both criminal behavior and violations of an organization’s security policies. But it is important to remember that it is only a part.

First, it is important to understand that access control is not an element of security; it is a concession that security programs make to daily operational necessities. Perfect security involves perfect access control. By that, I mean that in a perfect security environment, not one person can enter who is not absolutely known without question to be an ardent supporter of the security portion of the overall mission of the organization. In a real organization, this virtually never happens. Access control systems are an automated method to allow “presumed” friendlies to enter controlled, restricted, and secured areas of a facility with only minimal vetting at the access control portal. Indeed, access control portals are doorways through a security perimeter in which the entrants are “assumed” to be friendly, due to their status as an employee, contractor, or softly vetted visitor.

Understanding this, a new light is shed on the role of access control systems. They are a vulnerability that exists right in the heart of the security system. As such, one can now understand why one must understand Risk, Managing Risk, and Types of Countermeasures to understand how to properly utilize access control systems. One must also completely understand access control system principles so as not to create unseen vulnerabilities in the heart of the Security Program.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128054659000026

Central Alarm Stations and Dispatch Operations

Sean Smith, ... Rich Abrams, in The Professional Protection Officer, 2010

Access Control Systems

Access control systems are based on the premise that issuing keys to all employees who need them is generally not cost-effective. Another premise of an access control system is that it would be cost prohibitive to rekey the facility should a key be lost. Finally, an access control system can limit employee access; allowing them entry only to areas in which they are authorized, or granting entry during certain times of day.

An access control system uses a means of verification, known as a credential, to allow a person to enter an area. The credential can be something that is known, generally a personal identification number; something that is carried, such as a card or token; or something that the authorized person has, such as a fingerprint or iris (the colored part of the eye). The credential is entered, swiped, presented, or scanned, and, after some level of verification, access is granted or denied.

Access control systems come with various means of operation and scope from a single door to many thousands of doors or alarms around the world. At the small end of the access control spectrum is the single door keypad at which a person enters a code that is mechanically or electronically verified. Most access control systems use a card-based credential, which is swiped or presented to an electronic reader to gain access. These systems can be used across just a few doors to many thousands of doors and sensors connected via the company’s computer network. The most secure access control systems utilize a biometric authentication process. Biometrics entails using something that is part of the person for verification of identity, such as fingerprints, hand geometry, vein pattern recognition, voice print, and iris recognition. Biometrics can be used as the sole means of verification, but are frequently used in conjunction with a card reader.

Another main component of medium- to large-sized access control systems is the distributed processor, sometimes referred to as a field controller. This computer is installed between the main computer and the card reader at the door and communicates back to the main computer only when necessary, such as to request updated information about card holders or when there is an alarm. The distributed processor makes all of the decisions as to granting or denying access to a person who presents their card at the card reader, therefore taking the processing load off the main computer and allowing the entire system to operate faster. The distributed processor also allows the system to continue to operate if the connection back to the main computer is interrupted. Typically, distributed processors control between 2 and 16 doors and allow for the connection of various sensors, just like a regular alarm system. Distributed processors can communicate to the main computer via a communications protocol such as RS-232 or RS-485, although an increasing number of systems are now being connected to a company’s internal computer network (intranet). Newer systems are taking the network connection all the way down to the card reader at the door. Other systems use a Web-based interface for programming the system and can communicate down to the distributed processor via the network or through the wireless data network available from cell phone companies.

The main computer in an access control system can be a simple desktop computer for small systems up to redundant mirrored servers for very large systems, or any combination in between. In smaller systems, the computer is used for entering cardholder information and programming the system, whereas in larger systems there may be multiple computers dedicated to programming and photo badge creation or monitoring and controlling the various alarms and doors connected to the system. In the largest systems the desktops communicate to a server, which is a high-speed computer able to perform several thousand operations per second: essential for controlling the flow of data back and forth across a large access control system. In some cases, a secondary server is kept on standby to act as a reserve to the primary server should it fail or need periodic maintenance. When this secondary server is receiving the same updates at almost the same time as the primary server and can automatically take over the processing load, it is said to be redundant or mirrored.

Access control systems can be used to monitor alarms, such as door alarms, duress buttons, or environmental situations (high or low temperature, sump pump, water level). The control systems typically contain a graphical interface that allows the application to show building layout or to import floor plans from another application. Thus, all activity in the system is presented on a single screen. Automatic actions for certain events can be programmed into such a system, such as calling up a particular camera when a door goes into alarm.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781856177467000080

Access Control System Servers and Workstations

Thomas L. Norman CPP/PSP, in Electronic Access Control (Second Edition), 2017

Access Control System Networking

Access control systems on TCP/IP Ethernet networks on a single system at a single site may involve four main logical elements:

The core network

The server network

The workstation network

The access control panel network

Additionally, more complex system integrations may involve:

Integrated security system interfaces

Multisite network interfaces

Integration to the business IT network

VLANs

The core network

The core network typically comprises between one to any number of digital Ethernet switches for an alarm/access control system. Typically, the network may include:

A single digital Ethernet switch to connect the primary and back-up host servers and any workstations if there are no other TCP/IP devices such as access control panels

Multiple digital Ethernet switches as follows:

Core switch for the servers and workstations

Distribution switches connect multiple “Edge” switches to the “Core”

Edge switches for the access control panels

There may be one or two Core switches in a system, a larger number of Distribution Switches (perhaps one in each building on a campus), and many Edge switches (e.g., one Edge switch per floor of a building). The core network should include one or more good quality digital switches such as Cisco, HP, 3Com, and so forth (avoid the cheap computer store brands). The switch should be capable of supporting VLANs, VPNs, and both Unicast and Multicast protocols to the individual port. Redundant power supplies on the switch are a plus. Better switches are more reliable, less prone to the aging effects of the environment (temperature and humidity effects), and are more likely to work well when the access control system becomes part of a larger integrated security system including digital video cameras and digital intercoms.

I recommend that all digital switches in the same network are of the same brand (all Cisco, all 3Com, etc.). This facilitates better management of the switches and greater reliability of the network in real-world operations.

Typically Core and Distribution switches may be Layer 3 switches, while Edge switches may be Layer 2 or 3, depending on the needs of the system. (Layer 2 switches perform switch functions, while Layer 3 switches perform both switching and routing functions). Core, Distribution and Edge switches are also typically of differing capacities. Typically, Edge switches have the smallest capacity, Distribution Switches have the cumulative capacity of all connected Edge switches, and Core switches must have the cumulative capacity of all connected Distribution switches. Initial switch capacities should be at least 3–4 times the throughput of the initial device load. It’s not a bad idea to make the switch capacities 10 times the initial load, to ensure scalability over time as the technology matures.

The server network

The Servers are the core of the network. When you have a primary and back-up server, they should be connected together over an Ethernet network. These will network together through a “core switch.”

The workstation network

Although workstations can sometimes be connected to servers using serial communications (RS-232 or Universal Serial Bus, USB), TCP/IP Ethernet connections are recommended. These will connect to the servers through the core switch.

The access control panel network

Assuming that the system comprises only a single building, the access control panels can connect to the network through an edge switch located near the cluster master access control panel. Other panels can connect to the cluster master through TCP/IP Ethernet or RS-485 for most brands.

Ethernet has speed and connection distance limitations. Common Ethernet speeds include:

10Base-T—10 Mb/second (Mbps)

100Base-T—100 Mbps

1,000Base-T—1 Gb/second (Gbps)

10,000Base-T—10 Gbps

And higher

TCP/IP can connect via copper or fiber. Copper connections have a nominal distance limitation of 270 ft (100 m) for 10Base-T and 100Base-T systems. Copper connections include Category 5, (CAT-5), CAT-5E, and CAT-6 types. For 10Base-T and 100Base-T connections, CAT-5 and 5E connections are acceptable up to 100 m. CAT-6 connections serve 1 Gbps connections up to 100 m. CAT-6 cabling can also provide up to 1500 ft for 100Base-T connections.

Fiber connections include multi- and single-mode types. Multimode fiber is intended for relatively short runs or runs having lower speeds (1 Gbps or less). This is common for any runs over 100 m, such as between buildings. For 10 Gbps connections, always use single-mode fiber between buildings.

Alarm/access control systems typically push relatively few data as compared to digital video systems (the exception is that those systems also send video with alarm information).

Access control networks for access control panels can typically be 100Base-T networks. Connections between edge switches (at the access control panels) and the core switch (at the Servers) can be over 100Base-T copper Ethernet up to 100 m. Distances over that should connect through multimode fiber using SFP connectors on the digital switch.

Integrated security system interfaces

When you connect an alarm/access control system to other security and building systems, it is often best to do so by Ethernet connections. The exception is for connections between systems using dry contact interfaces, such as alarm or door control interfaces between systems.

Whenever connecting multiple systems on the same network, it is best to do so by placing each system on its own VLAN.

VLANs

VLANs allow you to isolate communications between systems, buildings, and sites to better manage the quality of communications when multiple systems share the same physical network. VLANs are accommodated with programming on the Digital Switches and with a VLAN addressing scheme so that you can easily see which VLAN each system and device are located within.

A typical VLAN addressing scheme might be:

10.100.1.XX—Digital Switch Administrative VLAN

10.100.2.XX—Digital Video System VLAN

10.100.3.XX—Alarm/Access Control System VLAN

10.100.4.XX—Security Intercom VLAN

VLANs require the core switch to be a routing switch capable of Level 3 commands. Distribution and edge switches must be capable of accepting VLAN programming. Additionally, VLANs can be programmed for each system for each building.

Multisite network interfaces

When the alarm/access control system expands across multiple sites it will be necessary to configure VLANs for each system for each site, and the VLANs may need to be routed through an existing business it network to avoid the usually unbearable cost of a dedicated wide-area security system network.

Integration to the business information technology network

In such cases, the Security System may need to comply with network and routing protocols and addressing schemes of the IT department. For this reason, it is advisable to coordinate beforehand with the IT department director to obtain VLAN protocols and an addressing scheme for the alarm/access control system network that will comply in the future with protocols and addressing schemes already in use by the IT department.

Although the security system may be on its own network now, as it grows to span multiple sites, it will often need to be routed through the IT Network. Making sure that you have VLAN protocols and addressing schemes that already comply with the IT department’s standards will ensure the least possible disruption if the two are merged together in the future and no harm is done if they are not merged.

Additionally, it is recommended to place the security system behind a hardware firewall to protect both the alarm/access control system and the business IT system from each other to ensure sustainability and reliability for both systems.

For the ultimate in protection, I recommend that the security system be routed through a VPN, which both completely isolates and encrypts the security system data from the business IT network. VPNs are also a good solution for merging systems if the VLANs are not protocol/network address compatible.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978012805465900018X

What Is Federated Identity?

Derrick Rountree, in Federated Identity Primer, 2013

2.3.3 Role-Based Access Control

RBAC systems are based on a user’s roles and responsibilities. Users aren’t given access to systems, roles are assigned to users, and access is granted to roles. In an RBAC system, roles are centrally managed by the administrator. The administrator determines what roles exist within their company and then maps these roles to job functions and tasks. Roles can effectively be implemented using security groups. You start by creating a security group representing each role and you assign permissions and rights to these groups. Then you simply add the appropriate users to the appropriate security groups, depending on their role or job function.

Since access is defined based on roles and specific job functions, you have more knowledge of what access users really require to perform this job. This aids in being able to grant access based on the principle of least privilege. The principle of least privilege states that users should be given the minimum amount of rights needed for them to do their job. Role-based access models also lend themselves to easier delegation. Delegation allows you to give administrative rights to someone else. You don’t have to give them full administrative rights. You can specify certain rights for them or certain objects for them to have administrative rights over.

RBAC systems can be difficult to implement. This is in part due to the large amount of up-front work that must be done. A lot of effort is required to identify all the various roles within an organization. It’s a little easier in a newer organization. But in a large, already-established organization it can take quite some time to identify all the necessary roles and configure your systems to recognize and make use of these roles.

Most Internet-based service providers use some sort of RBAC system. This makes it easier for them to automate user creation and access activities. Service providers have to deal with thousands and thousands of users. They can’t spend much time figuring out what access each user needs so they just determine which role to place the user in and the user is automatically given the appropriate rights.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124071896000029

Preventing System Intrusions

Michael A. West, in Computer and Information Security Handbook (Third Edition), 2013

Access Control Systems

Access control systems (ACSs) rely on administrator-defined rules that allow or restrict user access to protected network resources. These access rules can, for example, require strong user authentication such as tokens or biometric devices to prove the identity of users requesting access. They can also restrict access to various network services based on time of day or group need.

Some ACS products allow for the creation of an access control list (ACL), which is a set of rules that define security policy. These ACLs contain one or more access control entries (ACEs), which are the actual rule definitions themselves. These rules can restrict access by specific user, time of day, IP address, function (department, management level, etc.), or specific system from which a logon or access attempt is being made.

A good example of an ACS is SafeWord by Aladdin Knowledge Systems. SafeWord is considered a two-factor authentication system in that it uses what the user knows (such as a personal identification number, or PIN) and what the user has (such as a one-time passcode, or OTP, token) to strongly authenticate users requesting network access. SafeWord allows administrators to design customized access rules and restrictions to network resources, applications, and information.

In this scheme, the tokens are a key component. The token's internal cryptographic key algorithm is made “known” to an authentication server when the token's file is imported into a central database.

When the token is assigned to a user, its serial number is linked to that user in the user's record. On making an access request, the authentication server prompts the user to enter a username and the OTP generated by the token. If a PIN was also assigned to that user, she must either prepend or append that PIN to the token-generated passcode. As long as the authentication server receives what it expects, the user is granted whatever access privileges she was assigned.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128038437000077

Which are the 3 ways of authenticating user identity?

5 Common Authentication Types.
Multi-factor authentication..
Certificate-based authentication..
Biometric authentication..

What are the three 3 main types of authentication techniques?

There are three basic types of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

What are the 3 types of access control?

Three main types of access control systems are: Discretionary Access Control (DAC), Role Based Access Control (RBAC), and Mandatory Access Control (MAC). DAC is a type of access control system that assigns access rights based on rules specified by users.

What are the three principles of identity and access management?

IAM systems are designed to perform three key tasks: identify, authenticate, and authorize.