Authentication and Access Control (Lecture 8) Flashcards
What is the definition of Authentication?
User Authentication is the process of verifying an identity claimed by or for a system entity
It is the act of proving that a user is who they say they are
Methods - Something the user knows, is or has
What are the steps in the authentication process which is the basis for access control and user accountability?
Identification step - presenting an identifier to the security system (username)
Verification step - presenting or generating authentication information that corroborates the binding between the entity and the identifier
What does Something You Know include?
Passwords
Security questions
Attacks on ‘something you know’ as answers can be easy to figure out, especially with social media
What is salting in terms of concealing passwords?
When a new password is added and we want to conceal it we use a process called ‘salting’
Salting is a slow hash function. A salt is mixed with a password and is used by this slow hash function to create the stored password (Hash code) (Salt and user id kept with it)
When the user tries to authenticate, the user id goes in and then the password is entered. It then takes the entered password and the salt and runs it through the slow hash function and compares it to the stored hash code. If it matches then it allows you in.
Some passwords could result in the same hash codes, given the salt that is used. You can get dictionaries of hash codes that can be used.
What vulnerabilities are there to passwords? (8)
Offline dictionary attack
Specific account attack (using social media)
Popular password attack
Password guessing against single user (social media)
Workstation hijacking (key logging system)
Exploiting user mistakes
Exploiting multiple password use
Electronic monitoring
Name two types of password cracking and briefly explain
Dictionary attacks - develop large dictionary of possible passwords and try each against password file. Each password must be hashed using each salt value and compared to stored hash values
Rainbow table attacks - Pre-compute tables of hash values for all salts (giant table). Can be countered by using sufficiently large salt value and a sufficiently large hash length
What are the modern ways to counter password cracking
Having a complex password policy which forces the user to pick stronger passwords
How have password cracking techniques improved?
Processing capacity available for password cracking has increased
There are sophisticated algorithms which can generate potential passwords.
How do you protect the password file
Block access to the password file by only making it available to privileged users. This can block offline guessing attacks by denying access to encrypted passwords
What vulnerabilities are there for the password file?
Weakness in the OS that allows access to the file
Accident with permissions making it readable
Users with same password on other systems
Access from backup media
Sniff passwords in network traffic (Wireshark)
How can you reduce vulnerabilities with passwords?
User education - users told of the importance of using hard to guess passwords and given guidelines for creating strong passwords
Phrases rather than a password are good or first letter of phrase words
Use computer generated passwords - hard to remember but can be stored
Periodically run own password cracker to find guessable passwords
Have a complex password policy which rejects passwords that don’t meet requirements
Compile a large dictionary of passwords not to use
Bloom filter - used to build a table based on dictionary using hashes which checks desired password against this table
What problems are there with biometrics (the something you are)?
Intrusive
Expensive
Single point of failure which could lock you out
Sampling errors
False readings - similar thumbprint may work
Speed can be slow
Biometric data could be duplicated and forged
What is biometric authentication?
Attempts to authenticate an individual based on unique physical characteristics. It is based on pattern recognition.
Expensive and complex compared to using passwords and tokens
Uses facial characteristics Fingerprints Hand geometry Retinal pattern Iris Signature Voice
What are tokens (the something you have)?
A device that generates a code Might first need: Username Password then ask you for a token (number) usually changes after set time
Passcode = PIN + Tokencode
Name some types of cards used as tokens
Embossed (Raised characters that get scanned and imprinted like old credit cards)
Magnetic stripe - bar on back and characters on front
Memory (electronic memory inside like prepaid phone card
Smart contactless (Electronic memory and processor Electrical contacts exposed and radio antenna embedded inside