Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Security

What is IAM?

Friday, May 9th, 2014

A while back an internal audit focusing on IT administrative systems, in particular two areas, Human Resource Management and Student administration, was conducted. The audit tried to establish whether the university’s policy with regard to administrative system users complied with prescribed best practices and whether adequate processes are in place to manage access rights.

It was found that there was a need for a formal Identity and Access Management (IAM) policy, more regulated processes and one central source from which identities (see definition below) should be managed.

The current practice of issuing multiple electronic identities per business application or per individual associated with the university for access to administrative systems, lends itself to the fraudulent use of both electronic identities and information – a high risk at an academic institution.

The audit findings were considered and as a result thereof an all-encompassing Identity and Access Management  Project (IAM Project) was initiated to mitigate both known and potential risk  around system and resource (i.e. Library ) access.

In an effort for better control on creating identity the following three systems will be the only recognised systems from which both identity and electronic identity can originate.

  1. Student Administration – Registration of students including Short Course registrations
  2. Human Resource (HR) – All SU staff that needs to be reported on for statutory purposes or for whom a payroll needs to be run.
  3.  SUNid-  used for any person that forms an affiliation with SU, but cannot be classified as either student or staff. The current classification for this group of person is either that of external worker or visitor.

IAM aims to addresses 95% of the audit findings by establishing a central system from which one electronic identity can be issued via an automated process with full audit on who has access to which system and who approved the request. A future deliverable from this project would be a formal definition of roles (e.g. Payroll clerk) from system function (program) access patterns to facilitate role-based access request management.

An Electronic Identity Validation Regulation has already been approved and can viewed here.

The IAM project is one of continuous improvement and development. It’s more than just putting systems in place, but also about understanding the university’s organisational behaviour and processes to ensure these systems will increase productivity and function optimally.

To keep you up to date on upcoming IAM projects, we will be running a series of articles from this week. In our next article we’ll be looking at AIS. 

If you’re still in the dark as to how SunID works, refer to your wiki for detailed instructions or read our previous blog articles.

If you prefer a more hands-on approach, we’ll also be hosting a few informal sessions where you’ll be guided through the process step-by-step and also have the opportunity to air all your complaints and questions. If you’re like to attend one of these sessions, please contact Petro Uys at puys@sun.ac.za.


Definitions

Identity – the capturing of all personal information and creating a unique 8 digit Stellenbosch university number also commonly referred to as student number, staff number, ut_number, su_number.
    Electronic Identity – refers to username and password associated to an identity record 

Heartbleed wreaks havoc

Friday, May 9th, 2014

If you read about a computer bug in the YOU, it has to be serious. This is exactly what happened with Heartbleed last week.

The now already infamous bug surfaced last month and wreaked havoc and many popular websites. You also might have received an e-mail by now requesting you to change your password for certain websites.

Heartbleed indicates a vulnerability in security in OpenSSL software commonly for web encryption. The vulnerability allows a hacker access to the memory of data servers. According to Netcraft, a company specialising in interne research, 5000 websites might have been infected by it.

Unlike some viruses infiltrating your computer via e-mail, Heartbleed targets a weakness on web servers. This implies that someone using a compromised website, runs the risk of having his username, password or credit card details intercepted. Without too much effort your data can be obtained and also access to your account.

With Heartbleed hackers can also gain access to the digital keys responsible for encryption on servers and thereby access a company’s confidential, internal documents.

According to Vocativ, the term Heartbleed was chosen by Ossi Herrala, a systems administrator at Codenomicon. The technical name is CVE-2014-0160 and refers to the line of code where the bug is located. Heartbleed refers to an extension in OpenSSL called heartbeat. The protocol is used to keep connections open, even if data is not transmitted between connections.

If you haven’t changed your password for the affected sites, rather play it safe and change it anyway. It still remains good practice to change your passwords on a regular basis. If you want to know which sites have been targeted or what their current status is, you can do so here.

More detailed information on Heartbleed is available at:

http://www.cnet.com/news/how-to-protect-yourself-from-the-heartbleed-bug/
http://www.cnet.com/news/heartbleed-bug-what-you-need-to-know-faq/
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/
http://www.vocativ.com/tech/hacking/behind-scenes-crazy-72-hours-leading-heartbleed-discovery/

BRON: www.cnet.com

 

 

Internet Explorer vulnerability disclosed

Thursday, May 8th, 2014

Recently security vendor FireEye publicly disclosed a vulnerability in all versions of Internet Explorer. Government security response teams urged users to rather use an alternative browser until a security fix was released. After Microsoft released the update this week, it”s no longer needed to use an alternative browser.

This high risk vulnerability, if exploited by an attacker, would allow him to gain the same user rights as the current user. The security breach could be achieved by an attacker hosting a specially crafted website that is designed to exploit this vulnerability through IE and then convince a user to view the website.

He would then entice the user the attacker enticing a user to view the attacker-controlled content by getting them to click a link in an e-mail or IM message or by opening an attachment in an e-mail.

Updating your Internet Explorer (versions 6, 7, 8, 9, 10 and 11) is critical on Windows clients. The security update addresses the vulnerability by modifying the way IE handles objects in its memory.

Microsoft has released update KB2964358 and KB2964444 to prevent this vulnerability. (More information on Microsoft’s security update can be found here.)

Campus assets running Microsoft Windows OS have the WSUS configuration installed, automatic updating enabled and users will not need to take any action. The security update will be downloaded and installed automatically.

FireEye noted that attacks rely on Flash and advised users to disable the Flash plugin in IE. Also always ensure that your antivirus software is current and updated regularly to avoid future security attacks.

SOURCE: http://www.zdnet.com en www.mirosoft.com

MTN warns of new sim swap scam

Tuesday, April 8th, 2014

MTN South Africa has warned clients of a new sim card swap scam doing the rounds at the moment. This scam makes use of warning sms’s sent by MTN to their clients.

The syndicate attempts to get their hands on MTN clients’ personal banking details by sending an e-mail similar to the one below:

“Dear Client, We have discovered a suspected Sim swap attempt on your no. The swap will be processed within the next hour. If you did not initiate this Sim swap, please Cancel here.”

The “cancel” link diverts the user to a website where he submits his banking details. This harvested information can then be used to commit fraud from the account.

MTN warns cellphone users not to adhere to these e-mails. If a sim card switch takes place, communication will not take place by e-mail. MTN has blocked access to the site on their network, but clients of other providers should also look out for this scam.

If you are a MTN user, you can report incidents like these at 083 123 7867.

[SOURCE: www.techcentral.co.za]

CAPTCHA – help or hindrance?

Friday, February 28th, 2014

CAPTCHA,  or “Completely Automated Public Turing” is a type of reaction test generally used in the computing environment to establish whether the user is human or not. The term includes all technological tools used to distinguish humans from computers during online interaction.

The main purpose of CAPTCHA text is to prevent automatic computer processes from abusing e-mail systems by repeatedly entering passwords or from overloading or causing security problems on network services.

The most common example of CAPTCHA can be seen below and consists of a series of distorted or cross-hatched letters and numbers users have to retype. These distorted letters hidden in letters are easily recognised by humans, but computers find it difficult.

Unfortunately computers and CAPTCHA code hacking algorithms are becoming more sophisticated and subsequently the CAPTCHA codes also become more distorted and difficult for people to recognise.

The term was first used in 2000 by Luis von Ahn, Manuel Blum, Nicholas J. Hopper of the Carnegie Mellon University and John Langford of IBM. The most popular CAPTCHA was invented by Mark D. Lillibridge, Martin Abadi, Krishna Bharat and Andrei Z. Broder. This type of CAPTCHA prompts the user to retype letters displayed on a distorted image, sometimes also overshadowed by a series of other letters or numbers on the screen.

Seeing that this test, unlike the standard Turing test which is conducted by a person, is performed by a computer, it is often referred to as a reverse Turing test.

The CAPTCHA identification process for users has been heavily criticised, especially by disabled users, but also by other users who feel that their daily work is slowed down by distorted illegible words, even for people without disabilities.

Read more on CAPTCHA on the official website.

[SOURCE: http://www.webopedia.com/DidYouKnow/_index.asp and www.wikipedia.org]

 

© 2013-2025 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.