Chapter 3 Flashcards
The process of veifying an identity claimed by or for a system entity
RFC 4949
Fundamental building block and primary line of defence
Authentication Process
Something the individual:
- knows
- possesses
- is (static biometrics)
- does (dynamic biometrics)
4 means fo authenticating user identity
Assurance level
Potential impact
Areas of risk
Risk Assessment for User Authentication
Degree of confidence in the vetting process used to establish the identity of the individual to whom the credential was issued
Assurance Level
Low - limited effect
Moderate = serious effect
High = Severe effect
Potential Impact
Widely used line of defense against intruders
Password Authentication
Up to 8 printable characters in length; now regarded as inadequate
UNIX Implementation
Much stronger hash schemes available for Unix
Improved Implementations
- Dictionary attacks
- Rainbow table attacks
- Password crackers exploit the fact that people choose easy pw
- John the Ripper - open-source pw cracker
Password Cracking
Complex pw policy
Modern approches
Can block offline guessing attacks by denying access to encrypted pw
Password File Access Control
- User education
- Computer generated pw
- Reactive pw checking
- Complex pw policy
Password Selection Strategies
Pw cracker
Rule enforcement
Bloom filter
Proactive Pw checking
Can store but dont process data - Most common magnetic stripe card Cons: - requires reader -loss of token
Memory cards