4 - Authentication Flashcards
FAR, FRR importance
False acceptance rate - non identifiable user can authenticate
False rejection rate - identified user can’t authenticate
Importance - ERR (equal error rate) when FAR = FRR
Methods of authentication
Something a user:
Knows -
Pros: can be used if user forgets password
Cons: bad memory, can’t be changed if compromised, can be used multiple times
Has -
Pros: keys can be generated on command
Cons: devices being lost, one time pass can be intercepted, users don’t authenticate who is asking for 2f
Is -
Pros: can’t lose what you are (physical or behavioral)
Cons: fallback needed, privacy concerns, spoofing
Password hashing and attacks
Hashing - scrambled representation of password
Attacks - can be brute forced! Hashing helps if PW is stolen
Trusted path
We have a trusted way to authenticate with OS
Network auth introduces new problems