Why the two users can extract the secret

Assignment Help Computer Network Security
Reference no: EM133413394

Introduction to Cybersecurity

Assignment: User Authentication and Access Control

Purpose - User authentication and access control are important aspects in cybersecurity. In the first part of this assignment, you will apply the concepts we learned on user authentication into practice to assess two widely-used user authentication approaches, and their security & usability aspects. Once users are authenticated to a system, the system gives them authorization to access system resources based on their access rights. In the second part of this assignment, you will put your knowledge on access control into practice to analyse the security of a multi user file system and apply appropriate access control configurations to achieve its security requirements

Your task - This assignment is an individual assessment. You are given tasks on two widely-used authentication approaches: biometric and password, as well as the practical configuration of access control in a multiuser system.

Background

Multiple factor authentication, usually a combination of biometric and password authentication factors, is widely used today to verify the identity of a user attempting to access a system. After being verified, whether they are permitted to access certain resources in the system depends on the access control configured. This assignment is designed to improve your understanding of these topics and apply this understanding in a practical real world scenario.

Task 1 gives you the practical exercises on a two-factor authentication system while Task 2 is an access control exercise of how a network administrator can set the permissions to various users and user groups according to the system access control requirements.

Overview of the assignment
The assignment is worth 20% of your total unit mark. In Task 1 of the assignment (weight: 10% of your unit mark), you are to prepare an individual video to demonstrate your understanding of biometric authentication and password authentication.

For biometric authentication, you will use a given Face Recognition system, CompreFace (Option 1), or a sample face recognition testing data set (Option 2), to study how the system parameters affect the authentication accuracy. For password authentication, you will use the UNIX password authentication and use an attack tool application, John the Ripper and the UNIX password hashing tools, to study the impacts of password hashing parameters on the difficulty of hacking the hashed password and the usability of the system.

In Task 2 of the assignment (weight : 10% of your unit mark), you are given several practical tasks on the access control knowledge you acquired in the lectures and tutorials/labs. You are asked to create new users and assign them into appropriate user groups, as well as study how SUID is used to give special access rights to users running certain processes.

An individual report and a video containing all tasks in this assignment have to be submitted via Moodle links. In the report, you have to illustrate your results and the explanations for each task. You will also prepare a video of up to 15-minute presentation for each task.

To complete the tasks in this assignment, you have two options and you can choose to submit either option:
Option 1 (using CompreFace and original Asg2 VM): This is the original option and is identical to the one specified in the earlier version (ver 1.0) of this assignment spec doc, except for a couple of corrections to the Task 1b (indicated in purple font). For this option, a special VM is required to be installed on your computer containing the CompreFace face recognition software and is available for download from the Moodle Assessments page (note that this VM is different from the FIT2093 Lab VM). As the VM takes resources on computation, you are required to adjust the settings recommended in the Appendix.

Option 2 (using a sample face recognition testing data set for Task 1a and the Asg2Option2 VM for Task 1b and Task 2): For this option, for Task 1a, you will use

a sample face recognition testing data set provided in the Assignment Details Section of this document for Task 1a Option 2. For this option, you DO NOT need to use the CompreFace face recognition software for Task 1a. For Task 1b and Task 2 with this option, you can use the "FIT2093_Asg2_LW.ova" VM available for download from the Moodle `Assessment' page. This VM is lightweight and similar in system requirements to the FIT2093 Lab VM, so you should be able to install it on your device similarly to the FIT2093 Lab VM.

Task 1: Two-Factor Authentication System Task 1a) (5% of unit marks): Biometric authentication

In this task,you have two options and you can choose to submit either option. Please follow the corresponding instructions below for your chosen option.

Option 1 (using CompreFace and original Asg2 VM): This option for Task 1a is identical to the Task 1a specified in the earlier version (ver 1.0) of this assignment spec doc. An open source software application for face identification, CompreFace, is used for computing the biometric authentication factor. CompreFace and face collections of over 5000 people have been pre-installed in the Assignment 2 VM.

Option 2 (using a sample face recognition testing data set): For this option, you will use a sample face recognition testing data set provided in the instructions for Task 1a Option 2 below. For completing Task 1a with Option 2, you DO NOT need to use the CompreFace face recognition software or any other VM.

Using your own testing and given face image samples (Option 1) or the sample data sets (Option 2), you are asked to evaluate the security and usability of this biometric authentication software using the False Acceptance Rate (FAR) and False Rejection Rate (FRR) metrics discussed in the User Authentication lecture.

Instructions:

Option 1
1. Registering your subject:

• Install the Assignment 2 VM, and open the url https://localhost:8000/login in the Firefox browser to access the Compreface1 application. Use the following credentials to log in:
Username: [email protected]
Password: fit2093fit2093
• After logging in, you will see the following interface after selecting "Demo app" and then "FIT2093 Asg 2". Over 5000 subject face images (including faces of celebrities) have been uploaded in this app2.
• In the left panel, select "Face Collection", to show a number of subjects (which are now the names of celebrities) pre-uploaded in the app. After clicking "Add subject", type in your name as a subject and upload 5 of your own images under this subject.

2. Testing Phase and Computation:

• You have to prepare another set of your 10 own images and another 10 images of any other person(s) who is not in the "Face Collection".
• Select "Test" on the left panel, then upload the testing images with the example below using a threshold score value of 0.95. For each testing image, the CompreFace system will compare it with every registered subject image and display the best-fit registered image with the highest similarity to the testing image, i.e. the registered image with the highest similarity probability score (a number between 0 and 1). If the similarity probability score of the best-fit registered image is higher than the threshold score value, the system will consider the testing image to be a match with the best-fit registered image subject ("accept"). Otherwise, the system will regard the testing image to not match any registered subject ("reject").

In the example shown in Figure 1 below, the similarity probability score 0.97 of the testing image being "Adulallatif" is computed by the CompeFace app and displayed, since "Adulallatif" is the best-fit registered image to the testing image. As the similarity probability score of 0.97 is larger than the pre-set acceptance threshold score of 0.95, the testing image is falsely accepted to be "Adulallatif" although the testing image is actually of a different subject (Brad Pitt).

• Repeat this process for all your testing images and count the number of images falling in each of the four categories below. In the above example, the FP category count will increase by 1, since 0.97 > 0.95 and the image of Brad Pitt is mistakenly recognized by Compreface as Adulallatif.

False Accept/Positive (FP): Probability score > threshold ("accept") AND test image subject does NOT equal best-fit registered image subject

True Reject/Negative (TN): Probability score < threshold ("reject") AND test image subject does NOT equal best-fit registered image subject

True Accept/Positive (TP): Probability score > threshold ("accept") AND test image subject equals best-fit registered image subject,

False Reject/Negative (FN): Probability < threshold ("reject") AND test image subject equals best-fit registered image subject

• Compute the FAR and FRR metrics for your testing images using threshold of 0.95
and 0.98.

• Submit a video (with your facial inset) of up to 5min to illustrate your testing process and present your results of FRR and FAR. Discuss and explain the significance of the threshold, and which value of the threshold you think would be preferred, explaining your reasons.

• In the Task 1a section of your report, include the screen captures of your images uploaded to the face collection, a table of the testing results and your calculations of

FAR and FRR with these two different threshold settings. Finally, explanation of the significance of the choice of threshold and the impacts of the choice of threshold on the security and usability of the authentication system.

Option 2

Consider the sample testing results obtained using a Face recognition software in Table 1 and Table 2.

Table 1 contains the face recognition testing results using 10 images of a registered person called "Alice". For each of those 10 testing images, the table shows the name of the closest matching registered user name and the corresponding similarity probability score between the "Alice" testing image and the image of the closest matching registered user.

Table 2 contains the face recognition testing results using 10 images of an un-registered person called "Charlotte". For each of those 10 testing images, the table shows the name of the closest matching registered user name and the corresponding similarity probability score between the "Charlotte" testing image and the image of the closest matching registered user.

Registered Person ("Alice") Testing Image ID

Similarity Probability Score

Closest Matching

Registered User Name

1

0.996

Alice

2

0.997

Alice

3

0.984

Candice

4

0.977

Delta

5

0.996

Alice

6

0.999

Alice

7

0.982

Eve

8

0.986

Alice

9

0.990

Alice

10

0.995

Alice

Table 1. Results for Registered Person ("Alice") Testing Images

Un-Registered Person ("Charlotte") Testing Image

ID

Similarity Probability Score

Closest Matching

Registered User Name

1

0.952

Alice

2

0.937

Candice

3

0.931

Eve

4

0.918

April

5

0.915

June

6

0.937

Sara

7

0.926

Delta

8

0.909

Bella

9

0.982

Samantha

10

0.943

Samantha

Table 2. Results for Unregistered Person ("Charlotte") Testing Images

• For the testing data in Table 1 and Table 2, count the number of images falling in each of the four categories below.

False Accept/Positive (FP): Probability score > threshold ("accept") AND test image subject does NOT equal best-fit registered image subject

True Reject/Negative (TN): Probability score < threshold ("reject") AND test image subject does NOT equal best-fit registered image subject

True Accept/Positive (TP): Probability score > threshold ("accept") AND test image subject equals best-fit registered image subject,

False Reject/Negative (FN): Probability < threshold ("reject") AND test image subject equals best-fit registered image subject

• Based on the results in Table 1 and Table 2, Compute the FAR and FRR metrics for your testing images using threshold of 0.95 and 0.98.

• Submit a video (with your facial inset) of up to 5min to explain how you computed the FAR and FRR and present your results of FRR and FAR. Discuss and explain the significance of the threshold, and which value of the threshold you think would be preferred, explaining your reasons.

• In the Task 1a section of your report, include and explain your calculations of FAR and FRR with the two different threshold settings of 0.95 and 0.98. Finally, include an explanation of the significance of the choice of threshold and the impacts of the choice of threshold on the security and usability of the authentication system.

Task 1b): Password Authentication

In this task, you will attempt to hack some system passwords using John the Ripper (command john) which is pre-installed in your VM (either the original Asg2 VM or the FIT2093_Asg2_LW VM; those two VMs contain identical files for Task 1b) with a built-in password dictionary, and investigate how this time and the time to compute a single password hash depends on the hashing parameters. You can time the brute force password search process by using time john <password file>. You can also measure the time taken to compute a single password hash by SHA-512 using command time mkpasswd
-m sha-512 <password>. Note that you should use "user time" (time spent by CPU to execute the mkpasswd process, excluding kernel and other processes' CPU time) in your below computations.

• There are four hashed passwords, which are hashed3 by command mkpasswd using the SHA512 algorithm, located at /home/fit2093/Asg2_Task1b. For each of those password hash files, try to use the John the Ripper tool to time how long it takes to find the password by a search through the built in password dictionary of John:
• no_salting.hash : No salt with default no. of rounds which is 5000
• salting.hash : With salt with default no. of rounds of 5000
• salt_1000.hash : With salt with 1000 rounds (this is the minimum allowed number of rounds)
• salt_50000.hash : With salt with 50000 rounds

• Create and measure the time for a single password hashing using command time mkpasswd -m sha-512 <password> in the VM:
• no salt with default no. of rounds which is 5000
• With salt with default no. of round
• With salt with your preferred no. of rounds
• With salt with your higher no. of rounds

• In the Task 1b section of your report, include
(1) your results of the above four types with the screen captures of the time used by John the Ripper to find the password using a brute force search through its dictionary, as well as your screen capture of the measured "system" time taken to compute a single hash (which is an estimate for the time needed by a server for a single password login verification) for each of the four types of hashing approaches using mkpasswd,
(2) your discussion and comparison of the differences among all four approaches, you may use man mkpasswd to study how to use salting and change the number of the rounds; include an estimate of the time for a brute force search through a dictionary of 200 Million passwords for each approach
(3) your recommendation of which approach should be used for password hashing and your reasoning based on usability and security considerations

• In the Task 1b section of your video of up to 5 min, include
(1) a summary of all results of the time used by John the Ripper to find the password using a brute force search through its dictionary, as well as the measured time taken to compute a single hash (which is an estimate for the time needed by a server for a single password login verification) for each of the four types of hashing approaches using mkpasswd,
(2) discussion and comparison of the differences among all four approaches and the time estimate for a brute force search (without salting, or once the salt is exposed in the hash table) through a dictionary of 200 Million passwords with the different choices of number of rounds,
(3) your recommendation of which approach and how many rounds should be used for password hashing and your reasoning based on usability and security considerations.

Task 2: Access Control

In this task, you will assume the role of a system administrator, and your task is to configure the permissions for two new users and test if the file permissions are set appropriately for the desired access control policy. You have to create a video (with your facial inset) of no more than 5 minutes to demonstrate your answers to Task 2
(a) to (c). In your video presentation, you may use Powerpoint or any other software to explain your answers to the tasks if needed. Your report should include the screen captures, explanations and the command used in all subtasks in Task 2. Note that either the original Asg2 VM or the FIT2093_Asg2_LW VM can be used in this task; those two VMs contain identical files for Task 2.

2a) Create two new users, called peter and mary, who each have their home directory, called /home/[username] (e.g. /home/mary). Use command useradd to add mary into the existing groups hr and it, and add Peter only into the group it.
In your video, you should:
(1) Show your steps of creating the two users and adding them into the corresponding groups.
(2) Show the contents of the file /etc/group.
(3) Modify hr.txt using text editor gedit or nano or vi in the folder
/home/share-folder/hr and create the file it.txt in folder
/home/share-folder/it as the user mary.
(4) Modify /home/share-folder/hr/hr.txt and
/home/share-folder/it/it.txt as the user peter.
(Note: to remove a user, you can use the command "userdel -r [username]")

2b) A program, readsecret, is to read the file secret.txt in folder common. Login as fit2093 to set UID of the program such that mary and peter can run it to acquire the secret in "secret.txt".

In your video, login as the two users (peter and mary) and run the program, readsecret, owned by fit2093 in common. Show the file's permissions and explain why the two users can extract the secret in secret.txt.

2c) Folder employee allows all user groups to read the file, readonly.txt, however, only users in group hr can modify it. In this part of the task, you should login as user peter to modify the file readonly.txt without the change of permission settings. Suggest a mitigation if peter can modify the file.

Reference no: EM133413394

Questions Cloud

What kinds of things observed in nature might have led : What kinds of things observed in nature might have led the Pythagoreans to put such a great emphasis on number as an essential component of the cosmos?
How does that affect the truth table : Does while indicate a conjunction, disjunction, conditional or negation?-what fits best? Also note the position of the comma after the word sick.
Difference between bacteria-human cells and viruses : Most people don't really know the difference between bacteria, human cells, and viruses.
Explain james-lange theory-schachter and singer theory : Explain the differences between James-Lange theory and Schachter and Singer theory. Which one do you support and for what reason?
Why the two users can extract the secret : FIT2093 Introduction to Cybersecurity - Monash University - prepare an individual video to demonstrate your understanding of biometric authentication
Speed of enzyme-controlled reaction : Explain how very low and very high temperatures affect enzymes and the speed of an enzyme-controlled reaction.
Calvin cycle of photosynthesis : Summarize what happens during the Calvin cycle of photosynthesis. which fermentation is similar to aerobic cellular respiration?
Characteristics do you associate with speci?c careers : What are the resources at your institution that support career development? What qualities or characteristics do you associate with speci?c careers?
More efficient at producing the atp cells use as energy : Which process is more efficient at producing the ATP cells use as an energy source, and by how much?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why is network security particularly difficult to achieve

Why is network security particularly difficult to achieve?

  Analyze three current or future security issues in iot

Analyze critically three current or future security issues in IoT. Demonstrate professional and ethical behaviour with regard to network security.

  What role does cryptography provide in the application

Discuss an application that you currently use that either includes encryption technology. What role does cryptography provide in the application?

  Explain relationships among morality ethics and law

Describe and explain the relationships among morality, ethics, law, and crime as they intersect in the case example you have found.

  Each discussion question should be answered with about 200

each discussion question should be answered with about 200 words. no references should be used. responses should be

  What right did the fbi have in breaking into the iphone

What right did the FBI have in breaking into the iPhone? Was the FBI's actions probable cause?

  Interorganizational cybersecurity relationships

Interorganizational Cybersecurity Relationships

  Find at least four sites that offer malware listings

Search a number of antivirus companies websites and find at least four sites that offer malware listings and compare their latest malware lists

  Describe the most efficient attack against encryption method

Suppose Bob uses the RSA cryptosystem with a very large modulus n. If not, describe the most efficient attack against this encryption method.

  You need to create an access list that will prevent hosts

1.you are working on a router that has established privilege levels that restrict access to certain functions. you

  Analyzes the development of the system in your plan

Lists and explains the tasks associated with improving this interface. Analyzes development of the system in your plan. Analyzes the testing of the system in your plan. Analyzes the implementation of the system in your plan.

  Compare and contrast two cloud service providers

Compare and contrast two cloud service providers and their services. By doing this assignment, you will acquire a good understanding of available cloud service

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd