Authenticating users Flashcards
Authentication
Process of determining whether someone or something is who or what it declates itself to be
Where are users credentials stored for authentication?
Database of authorised, or registered, users
Authentication vs Authorisation
Authentication is the process of validating the identity of a registered user before allowing access whereas,
Authorisation is the process of validating that the authenticated user has been granted permission to access the requested resources
When can authentication be broken
When an attacker is able to be authenticated as a legitimate user
Happens when the attacker can guess, or brute force credentials.
When credentials are leaked and the attacker gets access
Brute force attack
Trying all possible solutions to a problem until a correct solution is found
Can be used to break authentication methods
Controlling brute force attacks
Strong password policy
Biometrics - fingerprint scanners
Notification of unrecognised login - users are notified and asked to confirm a login
Comprehensive login process - CAPTCHA(providing user is human) and Two Factor Authentication(more than just a password)
Limiting login attempts - lock user after certain number of attempts
Multi-factor authorisation
Requires two or more proofs of identity to authenticate a user
One time passwords or ReCAPTCHA
Why use MFA?
Helps prevent someone from signing into a user’s account, even if they know the password.
Passwords can be insecure
Strong secondary authentication factors
OTP - one-time password,
Time-based PIN
Digital certificates
What is an OTP
One time password - Unique and can only be used once
Usually, a short string of numbers is generated based on a secret stored in a physical device such as a smartphone or USB token
Time-based PIN
A sequence of digits which have to be entered within a short window(30 to 60 secs)
Can be generated by a software application or hardware device with a very precise lock
Digital certificates
Issued by a trusted certificate authority, is installed on a device or in the users browser
Only browser with valid certificate will be allowed to sign in
What do CAPTCHAs provide
Challenges that are difficult for computers to perform but relatively easy for humans
Types of CAPTCHA
Text based
Image based
Audio
Which is the most difficult type of CAPTCHA for bots but the easiest for humans to interpret
Image-based - as it requires image recognition and semantic classification