Authentication and Access Control (Lecture 8) Flashcards

1
Q

What is the definition of Authentication?

A

User Authentication is the process of verifying an identity claimed by or for a system entity

It is the act of proving that a user is who they say they are

Methods - Something the user knows, is or has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the steps in the authentication process which is the basis for access control and user accountability?

A

Identification step - presenting an identifier to the security system (username)

Verification step - presenting or generating authentication information that corroborates the binding between the entity and the identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Something You Know include?

A

Passwords
Security questions

Attacks on ‘something you know’ as answers can be easy to figure out, especially with social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is salting in terms of concealing passwords?

A

When a new password is added and we want to conceal it we use a process called ‘salting’

Salting is a slow hash function. A salt is mixed with a password and is used by this slow hash function to create the stored password (Hash code) (Salt and user id kept with it)

When the user tries to authenticate, the user id goes in and then the password is entered. It then takes the entered password and the salt and runs it through the slow hash function and compares it to the stored hash code. If it matches then it allows you in.
Some passwords could result in the same hash codes, given the salt that is used. You can get dictionaries of hash codes that can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What vulnerabilities are there to passwords? (8)

A

Offline dictionary attack

Specific account attack (using social media)

Popular password attack

Password guessing against single user (social media)

Workstation hijacking (key logging system)

Exploiting user mistakes

Exploiting multiple password use

Electronic monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name two types of password cracking and briefly explain

A

Dictionary attacks - develop large dictionary of possible passwords and try each against password file. Each password must be hashed using each salt value and compared to stored hash values

Rainbow table attacks - Pre-compute tables of hash values for all salts (giant table). Can be countered by using sufficiently large salt value and a sufficiently large hash length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the modern ways to counter password cracking

A

Having a complex password policy which forces the user to pick stronger passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How have password cracking techniques improved?

A

Processing capacity available for password cracking has increased

There are sophisticated algorithms which can generate potential passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you protect the password file

A

Block access to the password file by only making it available to privileged users. This can block offline guessing attacks by denying access to encrypted passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What vulnerabilities are there for the password file?

A

Weakness in the OS that allows access to the file

Accident with permissions making it readable

Users with same password on other systems

Access from backup media

Sniff passwords in network traffic (Wireshark)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you reduce vulnerabilities with passwords?

A

User education - users told of the importance of using hard to guess passwords and given guidelines for creating strong passwords

Phrases rather than a password are good or first letter of phrase words

Use computer generated passwords - hard to remember but can be stored

Periodically run own password cracker to find guessable passwords

Have a complex password policy which rejects passwords that don’t meet requirements

Compile a large dictionary of passwords not to use

Bloom filter - used to build a table based on dictionary using hashes which checks desired password against this table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What problems are there with biometrics (the something you are)?

A

Intrusive

Expensive

Single point of failure which could lock you out

Sampling errors

False readings - similar thumbprint may work

Speed can be slow

Biometric data could be duplicated and forged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is biometric authentication?

A

Attempts to authenticate an individual based on unique physical characteristics. It is based on pattern recognition.

Expensive and complex compared to using passwords and tokens

Uses facial characteristics
Fingerprints
Hand geometry
Retinal pattern
Iris
Signature
Voice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are tokens (the something you have)?

A
A device that generates a code
Might first need:
Username
Password
then ask you for a token (number) usually changes after set time

Passcode = PIN + Tokencode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name some types of cards used as tokens

A

Embossed (Raised characters that get scanned and imprinted like old credit cards)

Magnetic stripe - bar on back and characters on front

Memory (electronic memory inside like prepaid phone card

Smart contactless (Electronic memory and processor
Electrical contacts exposed and radio antenna embedded inside
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List some features of memory cards

A

Can store but do not process data

(Magnetic stripe cards)

Can be used alone for physical access (hotel cards) but more secure when used with a PIN

Requires a special reader, token/card can be lost and users dissatisfied

17
Q

List some features of Smart tokens

A

Include an embedded microprocessor

Looks like a bank card, calculator or small portable object

Manual interface can include a keypad and display for interaction

Electronic interfaces communicate with a compatible reader/writer

18
Q

What are the concepts used in risk assessments for user authentication

A

Assurance Level
Potential Impact
Areas of risk

19
Q

Explain the concept of assurance level in risk assessing authentication

A

Assurance level describes an organisation’s degree of certainty that a user has presented a credential that refers to his or her identity.

It is the degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued and that the individual who used the credential is the individual to whom the credential was issued

20
Q

Explain the concept of Potential Impact in risk assessing authentication

A

FIPS 199 defines three levels of potential impact on organisations or individuals should there be a breach of security

Low - authentication error could have limited adverse effect on operations, assets or individuals

Moderate - error could expect to have a serious adverse effect

High - error could expect to have severe or catastrophic adverse effect

21
Q

What are the levels of assurance?

A

Level 1 - 4 Level one having little or no confidence in asserted identity’s validity (using a key) and level 4 being highly confident (biometric)

22
Q

What is Remote User Authentication?

A

Authentication over a network, the Internet or a communications link (is more complex)

Creates additional security threats like eavesdropping, capturing a password, replaying an authentication sequence that has been observed

Generally rely on some form of a challenge-response protocol to counter threats

23
Q

What are some authentication security issues?

A

Denial-of-Service - attempts to disable a user authentication service by flooding service with many authentication attempts

Trojan horse - An application or physical device pretending to be an authentic application for purpose of capturing a user password or biometric

Client Attacks - Adversary attempts to achieve user authentication without access to the remote host or the intervening communications path

Replay attacks - adversary repeats a previously captured user response

Host attacks - directed at the user file at the host where passwords, tokens or biometric templates are stored

Eavesdropping - attempts to learn the password by some sort of attack that involves the physical proximity of user and adversary