CECS 378 : Final - User Authentication

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

User Authentication

The process of verifying an identity claimed by or for a system entity

2
New cards

Identification step

Presenting an identifier to the security system

3
New cards

Verification step

presenting or generating authentication information that corroborates the binding between the entity and the identifier

4
New cards

The four means of authenticating user identity are based on:

something the individual knows (passwords, pins)

something the individual possess (key, debit card)

something the individual is (physical features)

something the individual does (handwriting, voice patterns)

5
New cards

static biometrics

Recognition by fingerprint, retina, and face

6
New cards

Dynamic Biometrics

Voice pattern, handwriting characteristics, and typing rhythm.

7
New cards

risk assessment for user auth

Assurance level

potential impact

areas of risk

8
New cards

Assurance Level

Describes an organization's degree of certainty that a user has presented a credential that refers to his or her identity

9
New cards

Potential Impact

The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect; a serious

adverse effect, or a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

10
New cards

Password Authentication

- widely used line of defense against intruders

> user provides name/login and password

> system compares password with the one stored for that specified login

- the user ID:

> determines that the user is authorized to access the system

> determines the user's privileges

> is used in discretionary access control

11
New cards

Some password vulnerabilities

Offline dictionary attack

specific account attack

Popular password attack

Password guessing against single user

12
New cards

Unix Implementation:

1.) 12-bit salt to mod DES into 1-way hash

2.) zero value repeated 25 times

3.) output translated into 11 character sequence

13
New cards

Improved Implementations

Recommended hash function is based on MD5

Salt of up to 48-bits

Password length is unlimited

Produces 128-bit hash

Uses an inner loop with 1000 iterations to achieve slowdown

14
New cards

Four Password Cracking

Dictionary Attacks

Rainbow Table Attack

Password crackers

John the Ripper (password cracker in 1996)

15
New cards

Four Password selection Strategies

User education

Computer generated passwords

Reactive password checking

Complex password policy

16
New cards

Proactive Password Checking

Password Cracker

Rule enforcement

Bloom filter

17
New cards

Four card types

Embossed (Old credit card)

Magnetic Stripe (Bank Card)

Memory (Prepaid phone card)

Smart (Biometric ID card)

18
New cards

memory card

Can only store data.

commonly found in magnetic stripe card

19
New cards

Smart Token

A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing

20
New cards

Smart Cards

Credit card sized card containing a microchip for data storage and processing.

21
New cards

Electronic Identity Cards (eID)

Use of a smart card as a national identity card for citizens

22
New cards

Biometric Authentication

uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users

23
New cards

Remote User Authentication

- Authentication over a network, the Internet, or a communications link is more complex

- Additional security threats such as:

eavesdropping, capturing a password, replaying an

authentication sequence that has been observed

- Generally rely on some form of a challenge-response

protocol to counter threats

24
New cards

6 Auth Secuirty Issues

Eavesdropping

Denial-of-Service

Host Attacks

Trojan Horse

Client Attacks

Replay