SEARCH
  • [:en]Recent Posts[:af]Onlangse bydraes

  • [:en]Categories[:af]Kategorieë

  • [:en]Archives[:af]Argiewe

Security

What is IAM?Wat is IAM?

Friday, May 9th, 2014

A while back an internal audit focusing on IT administrative systems, in particular two areas, Human Resource Management and Student administration, was conducted. The audit tried to establish whether the university’s policy with regard to administrative system users complied with prescribed best practices and whether adequate processes are in place to manage access rights.

It was found that there was a need for a formal Identity and Access Management (IAM) policy, more regulated processes and one central source from which identities (see definition below) should be managed.

The current practice of issuing multiple electronic identities per business application or per individual associated with the university for access to administrative systems, lends itself to the fraudulent use of both electronic identities and information – a high risk at an academic institution.

The audit findings were considered and as a result thereof an all-encompassing Identity and Access Management  Project (IAM Project) was initiated to mitigate both known and potential risk  around system and resource (i.e. Library ) access.

In an effort for better control on creating identity the following three systems will be the only recognised systems from which both identity and electronic identity can originate.

  1. Student Administration – Registration of students including Short Course registrations
  2. Human Resource (HR) – All SU staff that needs to be reported on for statutory purposes or for whom a payroll needs to be run.
  3.  SUNid-  used for any person that forms an affiliation with SU, but cannot be classified as either student or staff. The current classification for this group of person is either that of external worker or visitor.

IAM aims to addresses 95% of the audit findings by establishing a central system from which one electronic identity can be issued via an automated process with full audit on who has access to which system and who approved the request. A future deliverable from this project would be a formal definition of roles (e.g. Payroll clerk) from system function (program) access patterns to facilitate role-based access request management.

An Electronic Identity Validation Regulation has already been approved and can viewed here.

The IAM project is one of continuous improvement and development. It’s more than just putting systems in place, but also about understanding the university’s organisational behaviour and processes to ensure these systems will increase productivity and function optimally.

To keep you up to date on upcoming IAM projects, we will be running a series of articles from this week. In our next article we’ll be looking at AIS. 

If you’re still in the dark as to how SunID works, refer to your wiki for detailed instructions or read our previous blog articles.

If you prefer a more hands-on approach, we’ll also be hosting a few informal sessions where you’ll be guided through the process step-by-step and also have the opportunity to air all your complaints and questions. If you’re like to attend one of these sessions, please contact Petro Uys at puys@sun.ac.za.


Definitions

Identity – the capturing of all personal information and creating a unique 8 digit Stellenbosch university number also commonly referred to as student number, staff number, ut_number, su_number.
    Electronic Identity – refers to username and password associated to an identity record 

`n Tydjie gelede is `n interne oudit met die fokus op IT administratiewe stelsels, spesifiek Menslike Hulpbronnebestuur en Studente-administrasie, uitgevoer. Die doel van die oudit was om vas te stel of die universiteit se beleid oor administratiewe stelselgebruikers voldoen aan voorgeskrewe beste praktyke en of voldoende prosesse in plek is om regte te bestuur. 

Daar is bevind dat `n behoefte bestaan vir `n formele  Identiteit- en toegangsbestuurbeleid (IAM), beter gereguleerde prosesse en een sentrale bron waaruit identiteite (sien definisies onder) bestuur moet word. 

Die huidige praktyk reik veelvuldige eletroniese identiteite uit vir toegang tot administratiewe stelsels en doen dit per besigheidstoepassing of per individu geassosieer met die universiteit. Hierdie proses kan maklik blootgestel word aan die misbruik van elektroniese identiteite en informasie – `n hoë risiko vir `n akademiese instansie.

Die ouditbevindinge is in ag geneem en op grond daarvan is `n oorkoepelende Identiteit- en toegangsbestuurprojek (IAM Projek) geloods om bestaande en potensiële risikos rondom stelsel- en brontoegang (byvoorbeeld die Biblioteek) aan te spreek. 

In `n poging om beter kontrole te handhaaf wanneer identiteite geskep word, sal die volgende drie stelsels die enigste erkende stelsels wees waarop identiteit en elektroniese identiteit geskep kan word.

  1. Studente-administrasie – Registrasie van studente, insluitende Kortkursusregistrasies
  2. Menslike Hulpbronne – Alle US-personeel wat wetlik oor rapporteer moet word of op die Universiteit se salarisrol is.
  3.  SUNid –  Gebruik vir enige persoon wat geaffilieerd is met die US, maar nie geklassifiseer kan word as student of personeel nie. Die huidige klassifikasie is die van eksterne werker of besoeker.*

IAM poog om 95% van die ouditbevindinge aan te spreek deur `n sentrale stelsel te vestig waarvandaan een elektroniese identiteit uitgereik kan. Dit sal uitgereik word deur middel van `n outomatiese proses met `n volledige oudit van wie toegang to watter stelsel het en die aansoek goedgekeur het.

 Een van die doelwitte van hierdie projek sal `n formele definisie wees van rolle (byvoorbeeld Salarisrolklerk), onttrek uit stelselfunksie bestuurspatrone om rolgebaseerde toegangsversoekbestuur toe te pas.

`n Elektroniese Validasie Reglement is reeds goedgekeur en kan hier besigtig word.

Die IAM-projek word deurlopend ontwikkel en verbeter. Dis meer as net ‘n proses om stelsels in plek te sit, maar vereis ook begrip vir die Universiteit se organisatoriese werkverrigting en prosesse om te verseker dat stelsels produktiwiteit sal verhoog en optimaal kan funksioneer.

Om jou op hoogte te hou van toekomstige IAM-projekte sal ons ook voortaan `n reeks artikels bied. Ons volgende een fokus op AIS.

 * Indien SUNid steeds vir jou Grieks is, kyk gerus op ons wiki vir `n uiteensetting of lees ons vorige blog-artikelIndien jy `n meer praktiese aanslag verkies, sal ons binnekort `n paar informele sessies aanbied waar jy stap-vir-stap daardeur geneem sal word en ook die geleentheid sal kry om al jou vrae te vra. Stuur asseblief e-pos aan Petro Uys by puys@sun.ac.za indien jy belangstel om `n sessie by te woon. 

 


Definitions

    Identity – the capturing of all personal information and creating a unique 8 digit Stellenbosch university number also commonly referred to as student number, staff number, ut_number, su_number.
    Electronic Identity – refers to username and password associated to an identity record 

 

Heartbleed wreaks havocHeartbleed saai verwoesting

Friday, May 9th, 2014

If you read about a computer bug in the YOU, it has to be serious. This is exactly what happened with Heartbleed last week.

The now already infamous bug surfaced last month and wreaked havoc and many popular websites. You also might have received an e-mail by now requesting you to change your password for certain websites.

Heartbleed indicates a vulnerability in security in OpenSSL software commonly for web encryption. The vulnerability allows a hacker access to the memory of data servers. According to Netcraft, a company specialising in interne research, 5000 websites might have been infected by it.

Unlike some viruses infiltrating your computer via e-mail, Heartbleed targets a weakness on web servers. This implies that someone using a compromised website, runs the risk of having his username, password or credit card details intercepted. Without too much effort your data can be obtained and also access to your account.

With Heartbleed hackers can also gain access to the digital keys responsible for encryption on servers and thereby access a company’s confidential, internal documents.

According to Vocativ, the term Heartbleed was chosen by Ossi Herrala, a systems administrator at Codenomicon. The technical name is CVE-2014-0160 and refers to the line of code where the bug is located. Heartbleed refers to an extension in OpenSSL called heartbeat. The protocol is used to keep connections open, even if data is not transmitted between connections.

If you haven’t changed your password for the affected sites, rather play it safe and change it anyway. It still remains good practice to change your passwords on a regular basis. If you want to know which sites have been targeted or what their current status is, you can do so here.

More detailed information on Heartbleed is available at:

http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/
http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/

BRON: www.cnet.com

 

 

Jy moet weet `n rekenaarswakplek is ernstig as dit al in die Huisgenoot gedraai het en dis presies wat laasweek met die Heartbleed gebeur het.

Die berugte swakplek het verlede maand sy opwagting gemaak en verwoesting gesaai op verskeie populêre webwerwe. Jy het waarskynlik teen die tyd  ook `n e-pos ontvang wat jou vriendelik versoek het om jou wagwoord te gaan verander op sommige webwerwe.

Heartbleed dui op `n swakplek in sekuriteit in OpenSSL sagteware wat `n kuberkraker toegang gee tot databedieners se geheue. Volgens Netcraft, `n maatskappy wat spesialiseer in internetnavorsing, is 5000 webwerwe moontlik besmet daardeur. 

Anders as virusse wat deur middel van e-pos op jou rekenaar beland, het Heartbleed swakplekke in kode op webbedieners aangeval. Dit beteken dat `n gebruiker van die webwerf wat aangeval is, se data – gebruikersnaam, wagwoorde en kredietkaartdetails, die risiko loop om onderskep te word. Jou inligting kan dus sonder moeite bekom word en kuberkrakers kan toegang kry tot jou rekening.

Dit beteken ook dat kuberkrakers toegang kan kry tot die bedieners se digitale sleutels, wat verantwoordelik is vir enkripsie en tot `n maatskappy se vertroulike, interne dokumente.

Volgens Vocativ, is die naam Heartbleed gekies deur Ossi Herrala,`n stelseladministreerder by Codenomicon. Die tegniese naam is CVE-2014-0160 en verwys na die lyn kode waarin die swakplek vervat is. Heartbleed verwys na `n verlenging in OpenSSL  genaamd heartbeat. Die protokol  word gebruik om verbindings oop te hou, selfs as data nie gestuur word tussen verbindings nie. 

Indien jy nog nie jou wagwoord verander het nie, speel liefs veilig en verander dit in elk geval. Dit bly steeds goeie praktyk om jou wagwoord gereeld te verander vir veiligheid. As jy wil weet watter webwerwe geteiken is deur Heartbleed, kan jy hier gaan kyk.

Meer gedetaileerde inligting oor Heartbleed is ook beskikbaar by:

http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/
http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/

BRON: www.cnet.com

 

Internet Explorer vulnerability disclosedInternet Explorer swakplek uitgewys

Thursday, May 8th, 2014

Recently security vendor FireEye publicly disclosed a vulnerability in all versions of Internet Explorer. Government security response teams urged users to rather use an alternative browser until a security fix was released. After Microsoft released the update this week, it”s no longer needed to use an alternative browser.

This high risk vulnerability, if exploited by an attacker, would allow him to gain the same user rights as the current user. The security breach could be achieved by an attacker hosting a specially crafted website that is designed to exploit this vulnerability through IE and then convince a user to view the website.

He would then entice the user the attacker enticing a user to view the attacker-controlled content by getting them to click a link in an e-mail or IM message or by opening an attachment in an e-mail.

Updating your Internet Explorer (versions 6, 7, 8, 9, 10 and 11) is critical on Windows clients. The security update addresses the vulnerability by modifying the way IE handles objects in its memory.

Microsoft has released update KB2964358 and KB2964444 to prevent this vulnerability. (More information on Microsoft’s security update can be found here.)

Campus assets running Microsoft Windows OS have the WSUS configuration installed, automatic updating enabled and users will not need to take any action. The security update will be downloaded and installed automatically.

FireEye noted that attacks rely on Flash and advised users to disable the Flash plugin in IE. Also always ensure that your antivirus software is current and updated regularly to avoid future security attacks.

SOURCE: http://www.zdnet.com en www.mirosoft.com

Sekuriteitsmaatskappy FireEye het onlangs bekendgemaak dat alle weergawes van Internet Explorer  oor `n swakplek beskik. Sekuriteitspanne van die Amerikaanse regering het selfs gebruikers versoek om eerder `n alternatiewe webblaaier te gebruik totdat `n sekuriteitsopdatering vrygestel word. Nadat Microsoft die week die `n nuwe opdatering vrygestel het, is die gebruik van `n alternatiewe blaaier egter nie meer nodig nie.

Hierdie hoë risiko kwesbaarheid kan, indien dit misbruik word deur `n kuberkraker, aan hom dieselfde regte gee as die huidige gebruiker van die program. Die sekuriteitskending kan plaasvind indien die aanvaller `n spesiaal-geboude webwerf, ontwerp om IE se kwesbaarheid te misbruik daarstel en gebruikers oortuig om dit te gebruik.

Die aanvaller kan `n gebruiker uitlok om na inhoud op sy webwerf te kyk deur middel van `n skakel in `n e-pos, `n aanlyn boodskap of deur die aanhangsel in `n e-pos oop te maak. 

Die opdatering van Internet Explorer (weergawes 6, 7, 8. 9, 10 en 11) is krities op Windows rekenaars. Die sekuriteitsopdatering spreek die swakplek aan deur die wyse waarop IE items in sy geheue hanteer, te verander. 

Microsoft het die sekuriteitsopdaterings KB2964358 en KB2964444 vrygestel om die swakplek te voorkom. (Meer inligting oor Microsoft se opdatering kan hier gelees word.)

Kampusrekenaars met Microsoft Windows OS het die WSUS konfigurasie, dateer outomaties op en gebruikers hoef self geen verdere aksie te neem nie. Die opdatering sal afgelaai word en outomaties installeer. T

FireEye het opgemerk dat hierdie tipe aanvalle Flash gebruik en het gebruikers aangeraai om die Flash inpropprogram buite werking te stel. Maak ook altyd seker dat jou antivirus sagteware op datum is en gereeld opdateer word om aanvalle in die toekoms te vermy.

 

BRON: http://www.zdnet.com en www.microsoft.com

 

MTN warns of new sim swap scamMTN waarsku teen nuwe simkaart skelmstreek

Tuesday, April 8th, 2014

MTN South Africa has warned clients of a new sim card swap scam doing the rounds at the moment. This scam makes use of warning sms’s sent by MTN to their clients.

The syndicate attempts to get their hands on MTN clients’ personal banking details by sending an e-mail similar to the one below:

“Dear Client, We have discovered a suspected Sim swap attempt on your no. The swap will be processed within the next hour. If you did not initiate this Sim swap, please Cancel here.”

The “cancel” link diverts the user to a website where he submits his banking details. This harvested information can then be used to commit fraud from the account.

MTN warns cellphone users not to adhere to these e-mails. If a sim card switch takes place, communication will not take place by e-mail. MTN has blocked access to the site on their network, but clients of other providers should also look out for this scam.

If you are a MTN user, you can report incidents like these at 083 123 7867.

[SOURCE: www.techcentral.co.za]

MTN in Suid-Afrika het pas sy kliënte gewaarsku dat `n nuwe simkaart skelmstreek tans die rondtes doen. Dié swendelary maak misbruik van die waarskuwing-sms’e wat MTN aan sy kliënte stuur.

Die sindikaat poog om MTN-kliënte se persoonlike bankdetails te bekom deur `n e-pos, soortgelyk aan onderstaande te stuur:

“Dear Client, We have discovered a suspected Sim swap attempt on your no. The swap will be processed within the next hour. If you did not initiate this Sim swap, please Cancel here.” 

Die “cancel”-skakel lei die gebruiker na `n webwerf waar hy/sy bankdetails moet invul. Vanselfsprekend kan kuberkriminele dan hierdie inligting gebruik om bedrog te pleeg vanaf die rekening.

MTN waarsku selfoongebruikers om nie op hierdie e-posse te reageer nie. Indien `n simkaart-omruiling sou plaasvind, sal daar nie d.m.v. e-pos gekommunikeer word nie. MTN het toegang tot die webwerf geblokkeer op sy netwerk, maar neem ook kennis van soortgelyke e-posse as jy op ander selfoonnetwerke is. 

Indien jy `n MTN-gebruiker is, rapporteer insidente by  083 123 7867.

[BRON: www.techcentral.co.za]

 

 

CAPTCHA – help or hindrance?CAPTCHA – nuttig of blote irritasie?

Friday, February 28th, 2014

CAPTCHA,  or “Completely Automated Public Turing” is a type of reaction test generally used in the computing environment to establish whether the user is human or not. The term includes all technological tools used to distinguish humans from computers during online interaction.

The main purpose of CAPTCHA text is to prevent automatic computer processes from abusing e-mail systems by repeatedly entering passwords or from overloading or causing security problems on network services.

The most common example of CAPTCHA can be seen below and consists of a series of distorted or cross-hatched letters and numbers users have to retype. These distorted letters hidden in letters are easily recognised by humans, but computers find it difficult.

Unfortunately computers and CAPTCHA code hacking algorithms are becoming more sophisticated and subsequently the CAPTCHA codes also become more distorted and difficult for people to recognise.

The term was first used in 2000 by Luis von Ahn, Manuel Blum, Nicholas J. Hopper of the Carnegie Mellon University and John Langford of IBM. The most popular CAPTCHA was invented by Mark D. Lillibridge, Martin Abadi, Krishna Bharat and Andrei Z. Broder. This type of CAPTCHA prompts the user to retype letters displayed on a distorted image, sometimes also overshadowed by a series of other letters or numbers on the screen.

Seeing that this test, unlike the standard Turing test which is conducted by a person, is performed by a computer, it is often referred to as a reverse Turing test.

The CAPTCHA identification process for users has been heavily criticised, especially by disabled users, but also by other users who feel that their daily work is slowed down by distorted illegible words, even for people without disabilities.

Read more on CAPTCHA on the official website.

[SOURCE: http://www.webopedia.com/DidYouKnow/_index.asp and www.wikipedia.org]

 

CAPTCHA, of “Completely Automated Public Turing” is `n tipe reaksietoets gebruik in die rekenaaromgewing om vas te stel of die gebruiker `n persoon is. Die term omvat alle tegnologiese middele wat gebruik word om mense van rekenaars te onderskei gedurende aanlyn interaksie. 

Die hoofdoel van CAPTCHA teks is om te verhoed dat outomatiese rekenaarprosesse e-pos stelsels misbruik deur herhaaldelik wagwoorde in te tik, of om onnodige stremming of sekuriteitsprobleme te veroorsaak vir netwerkdienste.

Die algemeenste voorbeeld van CAPTCHA kan onder gesien word en behels dat die gebruiker `n reeks verwronge of kruisluik (“cross-hatched”) letters en syfers herken en tik.  Mense kan verwronge letters wat weggesteek word in `n beeld maklik herken, terwyl rekenaars dit besonder moeilik vind.  

Ongelukkig word rekenaars en algoritmes wat CAPTCHA-kodes kraak meer gesofistikeerd en gevolglik raak die CAPTCHA-kodes ook meer verbuig en moeiliker vir mense om te herken. Sekuriteitspesialiste is voortdurend opsoek na nuwe CAPTCHA tegnieke wat robot-gedrewe misbruik kan voorkom sonder om die gewone gebruiker te benadeel. 

Die term is die eerste keer in 2000 deur Luis von Ahn, Manuel Blum, Nicholas J. Hopper van die Carnegie Mellon Universiteit en John Langford van IBM gevestig. Die algemeenste CAPTCHA is die eerste keer uitgevind deurMark D. Lillibridge, Martin Abadi, Krishna Bharat en Andrei Z. Broder. Dié tipe CAPTCHA vra van die gebruiker om die letters van `n verwronge beeld, wat soms ook oorskadu word deur `n reeks letters of syfers op die skerm, weer te gee.

Omdat die toets, anders as die standaard Turing-toets wat deur `n persoon gefasiliteer word, deur `n rekenaar uitgevoer word, word daarna soms verwys as `n omgekeerde Turing-toets. 

Hierdie identifikasieproses vir gebruikers is al hewiglik gekritiseer, veral deur gestremde persone, maar ook deur ander gebruikers wat voel dat hul daaglikse take belemmer word deur verwronge woorde wat onleesbaar is, selfs vir mense met geen gestremdhede.

Lees meer oor CAPTCHA op hulle amptelik webwerf

[BRON: http://www.webopedia.com/DidYouKnow/_index.asp en www.wikipedia.org]