Chapter 3- User Authentication

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Description and Tags

Flashcard set for chapter 3- User Authentication (CIS 4378- Computer and Network Security)

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Basic requirements for Authentication

  • Identify users, processes, or devices

  • Verify identities before granting access

2
New cards

Derived Requirements for Authentication

  • Use multifactor authentication (MFA) for local & network access

  • Use replay-resistant mechanisms for all accounts

3
New cards

Four Means of Authenticating User Identity

  • Something the individual knows

  • Something the individual possesses (token)

  • Something the individual is (statis biometrics)

  • Something the individual does (dynamic biometrics)

4
New cards

Password-Based Authentication

Widely used line of defense against intruders; user provides name/login and password

5
New cards

User ID

  • Determines that the user is authorized to access the system

  • Determines the user’s privileges

  • Is used in discretionary access control

6
New cards

Offline dictionary attack

Attacker tries a list of likely passwords on stolen password hashes.

7
New cards

Specific account attack

Targeting one user with tailored guesses (e.g., using personal info).

8
New cards

Popular password attack

Trying commonly used passwords like 123456 or password.

9
New cards

Password guessing (single user)

Brute-force guessing of one account’s password

10
New cards

Workstation Hijacking

Stealing credentials from an unattended or unlocked device

11
New cards

User mistakes

Weak, simple, or predictable passwords chosen by users

12
New cards

Multiple password use

Reusing passwords across accounts increases risk

13
New cards

Electronic monitoring

Keylogging or capturing passwords over the network

14
New cards

Dictionary attacks

  • Develop a large dictionary of possible passwords and try each against the password file

  • Each password must be hashed using each available salt value and then compared with stored hash values

15
New cards

Rainbow table attacks

  • Pre-compute tables of hash values for all salts

  • A mammoth table of hash values

  • Can be countered by using a sufficiently large salt value and a sufficiently large hash length

16
New cards

True

T or F: Password crackers exploit the fact that people choose easily guessable passwords

17
New cards

Users have trouble remembering them

One criticism of computer generated passwords is that….

18
New cards

Reactive password checking

System periodically runs its own password cracker to find guessable passwords

19
New cards

Complex password policy

User is allowed to select their own password, however the system checks to see if the password is allowable, and if not, rejects it

20
New cards

Rule enforcement

Specific rules that passwords must adhere to

21
New cards

Password checker

Compile a large dictionary of passwords not to use

22
New cards

Bloom filter

Used to build a table based on hash values

23
New cards

Embossed cards

Raised characters only, on front

24
New cards

Magnetic stripe

Magnetic bar on back, characters on front

25
New cards

Memory card

Electronic memory inside (e.g. prepaid phone card)

26
New cards

Smart

Biometric ID cards and credit cards are examples of what kind of card

27
New cards

Memory Cards

  • Can store but do not process data

  • The most common is the magnetic stripe card

  • Can include an internal electronic memory

  • Can be used alone for physical access (e.g. Hotel room, Gift card)

  • Provides significantly greater security when combined with a password or PIN

28
New cards
  • Requires special reader

  • Loss of token

  • User dissatisfaction

3 drawbacks of memory cards

29
New cards

Smart token

  • Physical characteristics:

    • Include an embedded microprocessor

    • Can look like calculators, keys, small portable objects

  • User interface:

    • Manual interfaces include a keypad and display for human/token interaction

  • Electronic interface

    • A smart card or other token requires an electronic interface to communicate with a compatible reader/writer

    • Contact and contactless interfaces

30
New cards

Authentication protocol for smart token

  • Static

  • Dynamic password generator

  • Challenge-response

31
New cards

Smart card

Most important category of smart token

32
New cards

Read-only memory (ROM), Electrically erasable programmable ROM (EEPROM), Random access memory (RAM); ROM, EEPROM, RAM

3 types of memory typically included in smart cards

33
New cards

True

T or F: Smart cards contain an entire microprocessor

34
New cards

False; smart cards may use any of the smart token protocls

T or F: Smart cards can only use specific smart token protocols

35
New cards

Random access memory (RAM)

Holds temporary data generated when applications are executed

36
New cards

Electrically erasable programmable ROM (EEPROM)

Holds application data and programs

37
New cards

Read-only memory (ROM)

Stores data that does not change during the card’s life

38
New cards

Electronic Identity Cards (eID)

Use of a smart card as a national identity card for citizens; a smart card that has been verified by the national government as valid and authentic

39
New cards

Most advanced deployment of an eID

German card neuer Personalausweis is an example of….

40
New cards

Password Authenticated Connection Establishment (PACE)

  • Ensures that the contactless RF chip in the eID card cannot be read without explicit access control

  • For online applications, access is established by the user entering the six-digit PIN (which should be known only to the holder of the card)

  • For offline applications, either the MRZ printed on the back of the card or the six-digit card access number (CAN) printed on the front is used

41
New cards

One-time password (OTP) device

  • Has a secret key to generate an password

  • User enters the password and the system validates the value entered

  • Uses a block cipher/hash function to combine secret key and time or nonce value to create password

  • Has a tamper-resistant module for secure storage of the secret key

This describes what kind of hardware authentication token

42
New cards

Time-based one-time password (TOTP)

  • Uses HMAC with a hash function

  • Used in many hardware tokens and by many mobile authenticator apps

  • Password is computed from the current Unix format time value

This describes what kind of hardware authentication token

43
New cards

Single factor authentication

Provides authentication service with just one factor

44
New cards

Multifactor authentication

Provides authentication service after a local authentication step

45
New cards

Hardware authentication tokens

Uses a user agent as an intermediary between authenticator and authenticating service

46
New cards

Authentication code via message

  • One of the simplest authentication approaches

  • Used for banking, government service access, etc.

  • No need to have any additional app on the phone

47
New cards

Disadvantages of authentication using a mobile phone

  • Requires mobile coverage to receive SMS

  • When mobile phone is lost or stolen, user will lose access or an attacker might gain access

  • Attackers might use a SIM swap attack

  • Attacker might also intercept messages using either a fake mobile tower, or by attacking SS7 signaling protocol

48
New cards

Mobile authentication apps

  • Implements a one-time password generator

  • Implements the “Time-based one-time password (TOTP)” algorithm

  • Does not require a network connection

  • Can be used with multiple accounts

  • More secure than authentication code

49
New cards

Biometric authentication

  • Attempts to authenticate an individual based on unique physical characteristics (fingerprint, face ID, retinal pattern, etc.)

  • Based on pattern recognition

  • Is technically complex and expensive when compared to passwords and tokens

50
New cards

Remote user authentication

  • Authentication over a network, the Internet, or a communications link is more complex

  • Generally, rely on some form of a challenge-response protocol to counter threats

51
New cards

Client attacks

Fake user login attempt (no host access)

52
New cards

Host attacks

Stealing stored passwords / tokens / biometrics

53
New cards

Eavesdropping

Observing user to capture credentials

54
New cards

Replay

Reusing previously captured login response

55
New cards

Trojan horse

Fake app/device capturing credentials

56
New cards

Denial-of-Service (DoS)

Flooding system to block valid logins