LCN 06 Authentication (MEMORISE ONLY)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Authentication

  • A party (claimant) presents a principal’s identity and claims to be that principal.

  • enables some party (verifier) to gain confidence that the claim is legitimate.

2
New cards

Authentication two distinct contexts

  • Entity authentication

  • Data origin authentication

3
New cards

Entity authentication

An identity presented by a remote party participating in a communication connection or a session

4
New cards

Data origin authentication

An identity is processed along with a data item.  It is claimed that the data originated from the principal identified

5
New cards

Identification vs Verification:

  • Identification is claiming and verification is proving.

6
New cards

Authentication 5 factors:

  1. Something you know

  2. Something you are

  3. Something you have

  4. Something you do

  5. Somewhere you are

7
New cards

Attacks on “Something you know”

  • Dictionary attacks

  • Inferring likely passwords/answers

  • Guessing

  • Exhaustive or brute-force attack

  • Rainbow tables

8
New cards

Rainbow Table

A precomputed table for reversing cryptographic hash functions

9
New cards

Password vulnerabilities:

  • Offline dictionary attack

  • Password guessing against single user

  • Workstation hijacking

  • Electronic monitoring

  • Specific account attack

  • Popular password attack

  • Exploiting user mistakes

  • Exploiting multiple password use

10
New cards

Attacks on passwords:

  • Social engineering (phishing, shoulder surfing, dumpster diving)

  • Capturing (keylogger, man-in-the-middle, and replay)

  • Resetting

11
New cards

Message Digest/Hash

Unique digital fingerprint digest created using hash algorithm when a password is made.

12
New cards

Salt

Unique random code added to passwords to make hash unique and minimise collisions.

13
New cards

Why are salted hashes important?

  • They prevent duplication of passwords from being visible in the password file.

  • More difficult to to crack using offline dictionary attacks.

  • Becomes nearly impossible to know if a person with passwords on more than one platform has used the same password on all of them.

14
New cards

Password Defences

  • Password complexity

  • Credential Management

15
New cards

Password Complexity

  • Mix characters

  • Choose long/complex passwords

  • Avoid names/words

16
New cards

Credential Management

  • Change passwords regularly

  • Avoid using same passwords for different applications

  • Do not disclose to others

  • Do not write it down

17
New cards

Password Selection strategies

  • User education

  • Computer generated passwords (Trouble memorising)

  • Reactive password checking (System runs own password cracker to find guessable passwords)

  • Complex password policy (User can pick password but system checks if strong or weak then rejects/accepts)

18
New cards

Standard biometrics:

  • Fingerprint

  • Hand geometry

  • Retina and iris

  • Face

  • Facial features

19
New cards

Advantages of Biometric authentication

  • Cannot be lost, forgotten, or shared, always available.

  • Difficult to be forged

20
New cards

Problems with biometrics

  • Some people find their use intrusive

  • Expensive

  • Sampling error

  • Single point of failure (If card doesn’t work, I can pull another, I can’t pull my finger)

  • Speed

  • Forgery

  • False Readings

21
New cards

Memory Cards

  • Can store but do not process data

  • Most common is magnetic stripe card

  • Can be used alone for physical access

  • Significantly greater security when mixed with password or pin.

22
New cards

Drawbacks of Memory Cards:

  • Requires a special reader

  • Loss of token

  • User dissatisfaction

23
New cards

Most important category of smart token

  • Has the appearance of a credit card

  • Has an electronic interface

  • May use any of the smart token protocols

24
New cards

Smart Cards contain three memories:

  1. Read-only memory (ROM)

  2. Electrically erasable programmable ROM (EEPROM)

  3. Random access memory (RAM)

25
New cards

Something you do AKA:

Behavioral / Cognitive Biometrics

26
New cards

Example of Something you do:

Picture Gesture Authentication

27
New cards

Federated Identity Management

A union of separate identification and authentication systems. Authentication is performed in one place, and separate processes and systems determine that an already authenticated user is to be activated.

28
New cards

Single Sign On (SSO)

Lets a user log on once per session but access many different applications/systems.

SSO uses one set of credentials that give access to all applications at once.