User Authentication

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Authentication

the determination of the identity of someone

2
New cards

What steps does authentication consist of?

• Identification

• Verification

3
New cards

Identification

present an identifier to the authentication system

4
New cards

Verification

verify the validity of the presented identifier

5
New cards

What are the main approaches for user authentication?

➢ something the person knows (e.g., password),

➢ something the person has (e.g., smart card, a radio key fob storing secret keys),

➢ something the person is (e.g., human fingerprint)

6
New cards

Authentication vs. authorization

Who you are vs. what you can do

7
New cards

Who has to be authenticated?

The client and the server

8
New cards

Issues with password authentication?

> People use the same passwords for multiple websites

> People have predictable passwords

9
New cards

Manual Guessing

Cracking a password using personal information

10
New cards

Interception

Intercepting a password as it is transmitted over a network

11
New cards

Brute force

Automated guessing of billions of passwords until a correct one is found

12
New cards

Shoulder Surfing

Observing someone typing their password

13
New cards

Stealing passwords

Stealing insecurely written passwords

14
New cards

Social Engineering

Using social engineering techniques to trick people into revealing passwords

15
New cards

Searching for passwords

IT infrastructure can be searched for stored password information

16
New cards

Key logging

Installing a keylogger that intercepts passwords as they are typed by monitoring each keystroke the user types on her/his keyboard.

17
New cards

How to counteract phishing

A fake site can steal a password so counteract this you could use server-side authentication such as SSL/TLS

18
New cards

How are keyloggers installed?

by attaching the program to an image or file and then send it via email

19
New cards

Popular keyloggers

• Refog • Revealer • KidLogger

20
New cards

Dumpster diving

Attacker looks into the trash for piece of papers or documents with written passwords

21
New cards

How to countermeasure shoulder-surfing and dumpster diving ?

User Awareness and Training

22
New cards

Exhaustive search brute force attack

• Try all possible combinations of symbols up to a certain length

• The size of the password space is |A|n where n is the length of our password and A is the alphabet

23
New cards

alphabet (A) is composed of upper- and lowercase letters, digits, common symbols

96 characters

24
New cards

Online dictionary attack

• Intelligent search

• Try passwords associated with the user

• e.g., name, name of friends, car brand

• Try words in a dictionary

• Try popular passwords

25
New cards

Positive of online dictionary attack

Saves attackers time

26
New cards

Issue with online dictionary attack

No guarantee the right password is found

27
New cards

Simple Countermeasures to password attacks?

• Password policies : minimal length, needed format and avoid obvious passwords

• Changing passwords: force users to change passwords regularly

• Machine-generated passwords: generate long and difficult passwords

28
New cards

More effective countermeasures for password attacks?

• Lockout mechanics : lock user account after several unsuccessful login attempts

• Throttling : introduce time delays between unsuccessful login attempts

• Protective monitoring: monitor login to detect unusual use and notify the user with details of attempted login

• Password blacklisting : Check if an input password is in a list of common words

29
New cards

Password strength

measures the effectiveness of a password against brute force attack. It estimates the number of trials an attacker should make to guess the password correctly

30
New cards

How is password strength normally computed?

|A|^n

• A is our alphabet (the set of symbols composing the password)

• n is the length of the password

31
New cards

How else can password strength be computed

Using entropy:

<p>Using entropy: </p>
32
New cards

What is the issue with using entropy for the security of a password?

Entropy mathematically means security but it does not take into account dictionary attacks.