Sistem Access Control &...

97
Sistem Access Control & Metodologi Dr. Mohammad Iqbal Thanks to Jeff Smith, CISSP et al

Transcript of Sistem Access Control &...

Page 1: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Sistem Access Control & Metodologi

1

Dr. Mohammad IqbalThanks to Jeff Smith, CISSP et al

Page 2: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Defenisi Access Controls

• Access control is the collection of mechanisms that permits managers of a system to exercise a directing or restraining influence over the behavior, use, and content of a system. It

2

use, and content of a system. It permits management to specify what users can do, which resources they can access, and what operations they can perform on a system.

Page 3: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Lingkup Materi Access Controls

• Konsep Access control

• Metodologi Access control

• Implementation within centralized and decentralized environments across the

3

enterprise’s computer systems.

• Access control techniques, detective and corrective measures to understand the potential risks, vulnerabilities, and exposures.

Page 4: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Overview Access Control

Access Controls: The security features that control how users and systems communicate and interact with one another.

Access: The flow of information between subject and object

Subject: An active entity that requests access

4

Subject: An active entity that requests access to an object or the data in an object

Object: A passive entity that contains information

Page 5: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Terminologi dalam Akses Kontrol

Accountable person who

desires access

User or process acting for person

Potential actions that may be

applied

Resource subject to access control

Secure Computing: Threats and Safeguards, 1997,Rita C. Summers

Computer Security, 1996,John Carroll

Subject ObjectRightsSubject

User Identifier

Data IdentifierAccess Control List

User Identifier

5

Computer Communications Security, 1994,Warwick Ford

X/Open Distributed SecurityFramework, 1994, The Open Group

CORBA Security ServicesSpecification 1.0, 1996, Object Management Group

Stephen T. Whitlock, Chief Strategist Information SecurityThe Boeing Company, 2008

Identifier Control ListIdentifier

User TargetAccess Permissions

Initiator

User TargetInitiator ACL Target ACL

Initiator

Principal, Subject

Target,Target Object

Access policy rights,Privilege attributes,Control attributes

Initiator, Client, Principal

ResourcePrincipalUser Action

Page 6: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Prinsip Keamanan

The three main security principles also pertain to access control:

• Availability

• Integrity

6

• Integrity

• Confidentiality

Page 7: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Prinsip Keamanan : Mengukur Nilai informasi – Segitiga CIA

The value of information comes from the characteristics it possesses

7

IdentificationAuthentication AuthorizationPrivacyAccountability

Page 8: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Prinsip Keamanan : Model ISO untuk Otorisasi

Access ControlEnforcement Function

ResourcePrincipal

Identity,Access Request Access

DecisionCache

Additional Attributes

ResourceLabels

8

AccessControl

DecisionFunction

Rules

Environmental,Resource, & Principal Attributes;Identifiers

DecisionRequest,Identity,

Attributes

DecisionSupport

Information

Policy

Admin

RelativelyStatic

Relatively Dynamic

AuditLogs

Page 9: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Prinsip Keamanan : Konsep Manajemen Privilege

Who are you?

Here’s your stuff...

Prove it!

Identification Authentication Authorization

9

Identification: The presentation of an identifier so that the system can recognize and distinguish the presenter from other principals

Authentication: The exchange of information in order to verify the claimed identity of a principal

Authorization: The granting of rights, including access, to a principal, by the proper authority

Principal: An entity (people, devices, applications, etc.) whose identity can be authenticated

Reference: Open Group XDSF (X/Open Distributed Security Framework), ISO 10181-3

Page 10: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Identifikasi, Otentikasi, dan Otorisasi

Identification, Authentication, and Authorization are distinct functions.

1. Identification

2. Authentication

3. Authorization

10

3. Authorization

Identity Management: A broad term to include the use of different products to identify, authenticate, and authorize users through automated means.

Page 11: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Identifikasi

Identification

• Method of establishing the subject’s (user, program, process) identity.

» Use of user name or other public information.

11

information.

» Know identification component requirements.

Identification: unproven assertion of identity

• “My name is…”

• Userid

Page 12: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Authentication

• Method of proving the identity.

» Something a person is, has, or does.

» Use of biometrics, passwords, passphrase, token, or other private information.

12

token, or other private information.

Strong Authentication is important

Authentication: proven assertion of identity• Userid and password

• Userid and PIN

• Biometric

Page 13: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Passwords

• User name + password most common identification, authentication scheme.

• Weak security mechanism, must implement strong password protections

13

strong password protections

• Implement Clipping Levels

Page 14: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Techniques to attack passwords

• Electronic monitoring

• Access the password file

• Brute Force Attacks

• Dictionary Attacks

14

• Dictionary Attacks

• Social Engineering

Know difference between a password checker and a password cracker.

Page 15: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Passphrase

• Is a sequence of characters that is longer than a password.

• Takes the place of a password.

• Can be more secure than a password

15

• Can be more secure than a password because it is more complex.

Page 16: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

One Time Passwords (aka Dynamic Passwords)

• Used for authentication purposes and are only good once.

16

• Can be generated in software (soft tokens), or in a piece of hardware

Page 17: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Two types of Token Devices (aka Password Generator)• Synchronous

» Time/event Based» Using one-time password

or hashed values

17

or hashed values» Authentication server

knows expected value from the token

» Counter Synchronization

• Asynchronous

Know the different types of devices and how they work.

Page 18: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Token: Two Factor Authentication

First factor: what user knows

Second factor: what user

Otentikasi

18

Second factor: what user has

Without the second factor, user cannot log in

Page 19: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Token: Two Factor Authentication

Otentikasi

19

Page 20: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Smart Cards and Memory Cards• Memory Cards: Holds but cannot process

information.

• Smart Cards: Holds and can process information.

20

» Contact

» Contactless– Hybrid

– Combi

Page 21: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Attacks on Smart Cards

• Fault Generation

• Microprobing

• Side Channel Attacks (nonintrusive attacks)

» Differential Power Analysis

21

» Differential Power Analysis

» Electromagnetic Analysis

» Timing

» Software attacks

Page 22: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Hashing & Encryption• Hash or encrypting a password to ensure that

passwords are not sent in clear text (means extra security)

Windows environment, know syskey

22

Windows environment, know syskey modes.

Salts: Random values added to encryption process for additional complexity.

Page 23: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Password Hashes

LM hash is weak, no longer used in Win 7

NT hash is stronger, but not salted

Otentikasi

23

http://www.emc.com/collateral/software/white-papers/h11013-rsa-dcp-0812-wp.pdf

Page 24: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Cryptographic Keys• Use of private keys or digital signatures to

prove identity

Private Key

24

Digital Signature• Beware digital signature vs. digitized

signature.

Page 25: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Biometrics• Verifies an identity by analyzing a unique person

attribute or behavior (e.g., what a person “is”).

Most expensive way to prove identity, also has difficulties with user acceptance.

25

has difficulties with user acceptance.

Many different types of biometric systems, know the most common.

Page 26: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Most common biometric systems:• Fingerprint• Palm Scan• Hand Geometry• Iris Scan

26

• Iris Scan• Signature Dynamics• Keyboard Dynamics• Voice Print• Facial Scan• Hand Topography

Page 27: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otentikasi

Biometric systems can be hard to compare.

Type I Error: False rejection rate.

27

Type II Error: False acceptance rate.

• This is an important error to avoid.

Crossover Error Rate

Page 28: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otorisasi

Authorization

• Determines that the proven identity has some set of characteristics associated with it that gives it the right to access the requested resources.

28

the requested resources.

Page 29: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otorisasi

Access Criteria can be thought of as:

• Roles

• Groups

• Location

29

• Location

• Time

• Transaction Types

Page 30: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otorisasi

Authorization concepts to keep in mind:

• Authorization Creep

• Default to Zero

30

• Default to Zero

• Need to Know Principle

• Access Control Lists

Page 31: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otorisasi

Problems in controlling access to assets:

• Different levels of users with different levels of access

31

levels of access

• Resources may be classified differently

• Diverse identity data

• Corporate environments keep changing

Page 32: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otorisasi

Solutions that enterprise wide and single sign on solutions supply:

• User provisioning

• Password synchronization and reset

• Self service

32

• Self service

• Centralized auditing and reporting

• Integrated workflow (increase in productivity)

• Regulatory compliance

Page 33: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Otorisasi

Single Sign On Capabilities• Allow user credentials to be entered one time

and the user is then able to access all resources in primary and secondary network domains

SSO technologies include:

33

SSO technologies include:• Kerberos• Sesame• Security Domains• Directory Services• Dumb Terminals

Page 34: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Authentication• Use a unique identifier–

» Example: user ID, Account number, PIN• 3 main datum used for authentication

» Something requester know– Passwords– Pass-phrases

» Something the requester is

Step dalam Mengakses Sistem

34

» Something the requester is– Biometrics– Physical characteristics

» Something the requester has– Tokens (one-time passwords, time synchronized token)– Smart Cards– USB Tokens

Authorization

Accounting

34

Page 35: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Model Access Control

Access Control Models

Three Main Types

1. Discretionary

2. Mandatory

35

2. Mandatory

3. Non-Discretionary (Role Based)

Page 36: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Model Access Control

Discretionary Access Control (DAC)

• A system that uses discretionary access control allows the owner of the resource to specify which subjects can access which resources.

36

resources.

• Access control is at the discretion of the owner.

Page 37: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Model Access Control

Mandatory Access Control (MAC)• Access control is based on a security

labeling system. Users have security clearances and resources have security labels that contain data classifications.

37

labels that contain data classifications.

• This model is used in environments where information classification and confidentiality is very important (e.g., the military).

Page 38: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Model Access Control

Non-Discretionary (Role Based) Access Control Models• Role Based Access Control (RBAC) uses a

centrally administered set of controls to determine how subjects and objects

38

determine how subjects and objects interact.

• Is the best system for an organization that has high turnover.

Page 39: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Teknologi Access Control

There are a number of different access controls and technologies available to support the different models.

• Rule Based Access Control

• Constrained User Interfaces

39

• Constrained User Interfaces

• Access Control Matrix

• Content Dependent Access Control

• Context Dependent Access Control

Page 40: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Teknologi Access Control

Rule Based Access Control

• Uses specific rules that indicate what can and cannot happen between a subject and an object.

40

an object.

• Not necessarily identity based.

• Traditionally, rule based access control has been used in MAC systems as an enforcement mechanism.

Page 41: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Teknologi Access Control

Constrained User Interfaces• Restrict user’s access abilities by not allowing

them certain types of access, or the ability to request certain functions or information

Three major types

41

Three major types• Menus and Shells• Database Views• Physically Constrained Interfaces

Page 42: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Teknologi Access Control

Access Control Matrix

• Is a table of subjects and objects indicating what actions individual subjects can take upon individual objects.

Two types

42

Two types

• Capability Table (bound to a subject)

• Access Control List (bound to an object)

Page 43: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Access Control Matrix

READWRITE

READWRITE

READREADREAD

Bob

Alice

A B C D

Resources

Principals

Bob’s

Access Control SystemBob carries around IdentityAZN System checksPrincipal identity

Teknologi Access Control

43

READ

WRITE

READWRITE

READWRITE

READWRITE

READ READ READ

READWRITE

READ

READ READ READ READ

READ

READREAD

READ

Alpha Group

Alpha n

Alpha 1

Eve

Backup

Bob’s Capability List

A collection of principals with the same rights forms a Group

A Role is a Group with a meaningful name

Access Control List for B

Principal identity

Capability Based SystemBob carries around Capability ListAZN System checksResource identity

Page 44: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Teknologi Access Control

Content Dependent Access Control:Access to an object is determined by the content within the object.

Context Based Access Control: Makes

44

Context Based Access Control: Makes access decision based on the context of a collection of information rather than content within an object.

Page 45: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Teknologi Access Control

45

Page 46: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Administrasi Access Control

First an organization must choose the access control model (DAC, MAC, RBAC).

Then the organization must select and implement different access control technologies.

Access Control Administration comes in two basic forms:

46

forms:• Centralized

• Decentralized

Page 47: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Administrasi Access Control

Centralized Access Control Administration:• One entity is responsible for overseeing access to

all corporate resources.

• Provides a consistent and uniform method of controlling access rights.

47

controlling access rights.» Protocols: Agreed upon ways of communication

» Attribute Value Pairs: Defined fields that accept certain values.

Types of Centralized Access Control• Radius• TACAS• Diameter

Page 48: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Administrasi Access Control

Decentralized Access Control Administration:

• Gives control of access to the people who are closer to the resources

• Has no methods for consistent control, lacks proper consistency.

48

proper consistency.

Page 49: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Metode Access Control

Access controls can be implemented at various layers of an organization, network, and individual systems

Three broad categories:

• Administrative (aka Management)

49

• Administrative (aka Management)

• Physical (aka Operational)

• Technical (aka Logical)

Page 50: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Administrative

• Examples: separation of duties, dual control, etc

Physical

Metode Access Control

50

Physical

• Examples: fences, alarms, badges, CCTV, etc

Technical

• Examples: antivirus, antis-spam, logs, etc

50

Page 51: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Metode Access Control

Administrative Controls• Policy and Procedure• Personnel Controls

» Separation of Duties» Rotation of Duties

51

» Rotation of Duties» Mandatory Vacation

• Supervisory Structure• Security Awareness Training• Testing

Page 52: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Metode Access Control

Physical Controls

• Network Segregation

• Perimeter Security

• Computer Controls

• Work Area Separation

52

• Work Area Separation

• Data Backups

• Cabling

• Control Zone

Page 53: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Metode Access Control

Technical (Logical) Controls

• System Access

• Network Architecture

• Network Access

• Encryption and protocols

53

• Auditing

Page 54: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Tipe-tipe Access Control

Each control works at a different level of granularity, but can also perform several functions

Access Control Functionalities• Prevent• Detect

54

• Detect• Correct• Deter• Recover• Compensate

Page 55: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Preventive Access controls• Avoid having unwanted actions/events by blocking the ability to do

them.

Detective• Identify unwanted actions or events after they occur.

Corrective• Remedy circumstances that enabled the unwanted activity.• Return to state prior to the unwanted activity.

Tipe-tipe Access Control

55

• Return to state prior to the unwanted activity.

Directive• Dictated by higher authority in laws or regulations or those specified

in organization policy

Deterrent• Prescribe punishment for noncompliance

Recovery• Restore lost computing resources or capabilities.

Compensating• Reinforce or replace normal controls that are unavailable

55

Page 56: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Preventive Controls

Block or control specific events

• Firewalls

• Anti-virus software

Tipe-tipe Access Control

56

• Anti-virus software

• Encryption

• Key card systems

• Bollards stop cars (as shown)

Page 57: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Deterrent Controls

• Highly visible

• Prevent offenses by influencing choices of would-be intruders

Tipe-tipe Access Control

57

Detective Controls

• Monitor and record specific types of events

• Does not stop or directly influence events

Page 58: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Corrective Controls

• Post-event controls to prevent recurrence

• “Corrective” refers to when it is implemented

• Examples (if implemented after an incident)

» Spam filter

Tipe-tipe Access Control

58

» Anti-virus on e-mail server

» WPA Wi-Fi encryption

Recovery Control

• Post-incident controls to recover systems

Page 59: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Compensating Controls

Control that is introduced that compensates for the absence or failure of a control

“Compensating” refers to why it is

Tipe-tipe Access Control

59

“Compensating” refers to why it is implemented

Examples• Daily monitoring of anti-virus console

• Monthly review of administrative logins

• Web Application Firewall used to protect buggy application

Page 60: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Hubungan Metode dan Tipe Access Control

Controls Administrative Technical Physical

Directive Policy Warning Banner ‘Do Not Enter’

Deterrent Demotion Violation Reports

‘Beware of Dog’

Preventive User Registration

Passwords, Tokens

Fences, Bollards

60

Registration Tokens Bollards

Detective Report Reviews Audit Logs, IDS Sensors, CCTV

Corrective Employee Termination

Connection Management

Fire Extinguisher

Recovery DRP Backups Reconstruct, Rebuild

Compensating Supervision,Job Rotation

Keystroke Logging

Layered Defenses

Page 61: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Akuntabilitas

Accountability is tracked by recording user, system, and application activities.

Audit information must be reviewed• Event Oriented Audit Review

• Real Time and Near Real Time Review

61

• Real Time and Near Real Time Review

• Audit Reduction Tools

• Variance Detection Tools

• Attack Signature Tools

Page 62: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Akuntabilitas

Other accountability concepts…

Keystroke Monitoring• Can review and record keystroke entries by a user

during an active session.

• A hacker can also do this

62

• May have privacy implications for an organization

Scrubbing: Removing specific incriminating data within audit logs

Page 63: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Penerapan Access Control

Know the access control tasks that need to be accomplished regularly to ensure satisfactory security. Best practices include:• Deny access to anonymous accounts• Enforce strict access criteria

63

• Enforce strict access criteria• Suspend inactive accounts• Replace default passwords• Enforce password rotation• Audit and review• Protect audit logs

Page 64: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Penerapan Access Control

Unauthorized Disclosure of Information• Object Reuse• Data Hiding

Emanation Security (Security to block electrical signals from electronic equipment.)• Tempest : a project started by the DoD and then turned

into a standard that outlines how to develop

64

into a standard that outlines how to develop countermeasures that control spurious electrical signals that are emitted by electronic equipment

• White Noise : A uniform spectrum of random electrical signals. It is distributed over the full spectrum so that the bandwidth is constant and an intruder is not able to decipher real information from random noise or random information.

• Control Zone : Creates a security perimeter and is constructed to protect against unauthorized access to data or compromise of sensitive information. *

Page 65: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Testing Access Controls

Access controls are the primary defense that protect assets

Types of tests:

• Penetration tests

65

• Penetration tests

• Application vulnerability tests

• Code reviews

http://secunia.com/community/

Page 66: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Penetration Testing

Automatic scans to discover vulnerabilities

Testing Access Controls

66

Example tools: Nessus, Nikto, SAINT, Superscan, Retina, ISS, Microsoft Baseline Security Analyzer

Page 67: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Application Vulnerability Testing

Discover vulnerabilities in an application

Automated tools and manual tools

Testing Access Controls

67

Example vulnerabilities

• Cross-site scripting, injection flaws, malicious file execution, broken authentication, broken session management, information leakage, insecure use of encryption, and many more

Page 68: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Audit Log Analysis

Regular examination of audit and event logs

Detect unwanted events

Testing Access Controls

68

Detect unwanted events

• Audit log protection

Page 69: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Monitoring Access Control

Intrusion Detection• Three Common Components

» Sensors

» Analyzers

» Administrator Interfaces

69

» Administrator Interfaces

• Common Types» Intrusion Detection

» Intrusion Prevention

» Honeypots

» Network Sniffers

Page 70: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Monitoring Access Control

Two Main Types of Intrusion Detection Systems• Network Based (NIDS)

• Host Based (HIDS)

HIDS and NIDS can be:• Signature Based

70

• Signature Based

• Statistical Anomaly Based» Protocol Anomaly Based

» Traffic Anomaly Based

• Rule Based

Page 71: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Monitoring Access Control

Intrusion Prevention Systems

• The next big thing

• Is a preventative and proactive technology, IDS is a detective technology.

• Two types: Network Based (NIPS) and

71

• Two types: Network Based (NIPS) and Host Based (HIPS)

Page 72: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Monitoring Access Control

Honeypots

• An attractive offering that hopes to lure attackers away from critical systems

Network sniffers

• A general term for programs or devices that are

72

• A general term for programs or devices that are able to examine traffic on a LAN segment.

Page 73: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Tantangan untuk Access Control

A few threats to access control• Insiders

» Countermeasures include good policies and procedures, separation of duties, job rotation

• Dictionary Attacks» Countermeasures include strong password policies,

strong authentication, intrusion detection and

73

strong authentication, intrusion detection and prevention

• Brute Force Attacks» Countermeasures include penetration testing, minimum

necessary information provided, monitoring, intrusion detection, clipping levels

• Spoofing at Logon» Countermeasures include a guaranteed trusted path,

security awareness to be aware of phishing scams, SSL connection

Page 74: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Serangan pada Access Control

Intruders will try to defeat, bypass, or trick access controls in order to reach their target

Attack objectives

• Guess credentials

• Malfunction of access controls

74

• Malfunction of access controls

• Bypass access controls

• Replay known good logins

• Trick people into giving up credentials

Page 75: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Buffer Overflow

Cause malfunction in a way that permits illicit access

Send more data than application was

Serangan pada Access Control

75

Send more data than application was designed to handle properly

Countermeasure: “safe” coding that limits length of input data; filter input data to remove unsafe characters

Page 76: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Script Injection

Insertion of scripting language characters into application input fields

• Execute script on server side

Serangan pada Access Control

76

• Execute script on server side

• Execute script on client side – trick user or browser

Countermeasures: strip “unsafe” characters from input

Page 77: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Data Remanence

Literally: data that remains after it has been “deleted”

Examples

Serangan pada Access Control

77

Examples

• Deleted hard drive files

• Erased files

• Discarded / lost media: USB keys, backup tapes, CDs

Countermeasures: improve media

Page 78: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Denial of Service (DoS)

Actions that cause target system to fail, thereby denying service to legitimate users

Serangan pada Access Control

78

legitimate users

• Distributed Denial of Service (DDoS)

Countermeasures: input filters, patches, high capacity

Page 79: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Eavesdropping

Interception of data transmissions

Countermeasures: encryption, stronger encryption

Serangan pada Access Control

79

encryption

Page 80: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Spoofing and Masquerading

Specially crafted network packets that contain forged address of origin

Countermeasures: router / firewall

Serangan pada Access Control

80

Countermeasures: router / firewall configuration to drop forged packets, judicious use of e-mail for signaling or data transfer

http://www.techrepublic.com/blog/security/how-to-spoof-a-mac-address/395

Page 81: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Social Engineering

Tricking people into giving out sensitive information by making them think they are helping someone

Serangan pada Access Control

81

think they are helping someone

Countermeasures: security awareness training

Page 82: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Phishing

Incoming, fraudulent e-mail messages designed to give the appearance of origin from a

Serangan pada Access Control

82

appearance of origin from a legitimate institution

Tricks user into providing sensitive data via a forged web site (common) or return e-mail (less common)

Page 83: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Pharming

Redirection of traffic to a forged website

Serangan pada Access Control

83

website

Countermeasures: user awareness training, patches, better controls

Page 84: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Malicious Code

Viruses, worms, Trojan horses, spyware, key logger

Harvest data or cause system

Serangan pada Access Control

84

Harvest data or cause system malfunction

Countermeasures: anti-virus, anti-spyware, security awareness training

Page 85: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Model Arsitektur Keamanan untuk AC

• Can help organizations quickly make improvements through adaptation

• Can focus on:

85

• Can focus on:

– computer hardware and software

– policies and practices

– the confidentiality of information

– the integrity of the information

– Pick one and go with it

Page 86: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Bell-LaPadula Confidentiality Model

• A state machine model that helps ensure the confidentiality of an information system

Model Arsitektur Keamanan untuk AC

86

information system

– Using mandatory access controls (MACs), data classification, and security clearances

Page 87: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Biba Integrity Model

• Provides access controls to ensure that objects or subjects cannot have less integrity as a result of read/write operations

Model Arsitektur Keamanan untuk AC

87

operations

• Ensures no information from a subject can be passed on to an object in a higher security level

– This prevents contaminating data of higher integrity with data of lower integrity

Page 88: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Clark-Wilson Integrity Model

• Built upon principles of change control rather than integrity levels

• Its change control principles

Model Arsitektur Keamanan untuk AC

88

• Its change control principles

– No changes by unauthorized subjects

– No unauthorized changes by authorized subjects

– The maintenance of internal and external consistency

Page 89: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Graham-Denning Access Control Model

• Composed of three parts

– A set of objects

– A set of subjects (a process and a domain)

Model Arsitektur Keamanan untuk AC

89

– A set of subjects (a process and a domain)

– A set of rights

• Primitive protection rights

– Create or delete object, create or delete subject

– Read, grant, transfer and delete access rights

Page 90: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Harrison-Ruzzo-Ullman Model

• Defines a method to allow changes to access rights and the addition and removal of subjects and objects

– Since systems change over time, their protective

Model Arsitektur Keamanan untuk AC

90

– Since systems change over time, their protective states need to change

• Built on an access control matrix

• Includes a set of generic rights and a specific set of commands

Page 91: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Brewer-Nash Model (aka Chinese Wall)

• Designed to prevent a conflict of interest between two parties

Model Arsitektur Keamanan untuk AC

91

• Requires users to select one of two conflicting sets of data, after which they cannot access the conflicting data

Page 92: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

The ISO 27000 Series

• Information Technology – Code of Practice for Information Security Management– One of the most widely referenced and discussed security

models

Model Arsitektur Keamanan untuk AC

92

models

– Originally published as British Standard 7799 and then later as ISO/IEC 17799

– Since been renamed ISO/IEC 27002

• Establishes guidelines for initiating, implementing, maintaining, and improving information security management

Page 93: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

The ISO 27000 Series

Model Arsitektur Keamanan untuk AC

93

(Lanjutan)

Page 94: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

Control Objectives for Information and Related Technology (COBIT)

• Control Objectives for Information and Related Technology (COBIT)

Model Arsitektur Keamanan untuk AC

94

– Provides advice about the implementation of sound controls and control objectives for InfoSec

– Created by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI) in 1992

Page 95: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

COSO

• U.S. private-sector initiative

– Major Objective: identify factors that cause fraudulent financial reporting and to make

Model Arsitektur Keamanan untuk AC

95

fraudulent financial reporting and to make recommendations to reduce its incidence

– Has established a common definition of internal controls, standards and criteria

– Helps organizations comply with critical regulations like Sarbanes-Oxley

Page 96: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

COSO (Lanjutan)

• Built on five interrelated components:

– Control environment

– Risk assessment

Model Arsitektur Keamanan untuk AC

96

– Risk assessment

– Control activities

– Information and communication

– Monitoring

Page 97: Sistem Access Control & Metodologimohiqbal.staff.gunadarma.ac.id/Downloads/files/35152/mohiqbal+-+1... · Sistem Access Control & Metodologi 1 Dr. Mohammad Iqbal Thanks to Jeff Smith,

- Selesai -

97