Chapter 3 - User Authentication Flashcards
User Authentication Simple Definition
The process of verifying an identity claimed by or for a system entity
NIST Definition of User Authentication
The Process of establishing confidence in user identities presented electronically to an information system
What is User Authentication considered?
Role in Security System
- Fundamental building block
- primary line of defense in computer security
- basis for most types of access control and accountability
Two steps in the authentication process
- Identification: Presenting an identifier to the system
- Verification: confirm binding between the entity and the identifier
Is FaceID identifier or verifier?
Verifier because it validates identity by comparing face to stored facial data.
Identifier is implicit!
4 means of authenticating user identity and issues with each
Something the individual: _____
- Something individual knows
(Password, PIN, answer to security questions) - must be as secure as the password
- Password guessing/stealing/forgetting - Something the individual possesses Token
(Smartcard, electronic keycard, physical key)
- theft/loss - Something the individual is
(Static biometrics like fingerprint, retina or face)
- false positives/negatives
- user acceptance issues
- inconvenience to set up - Something the individual does
(dynamic biometrics like voice pattern, handwriting, or typing ryhythm)
What is password-based authentication?
Method where a user provides a name/(loginID) and a password, which the system compares with a stored password for that login
userID
1. Authorized to enter system?
2. Which privileges?
3. Access control
Password Vulnerabilities (8)
Eric, Please Offer Spectacular Passwords When Making Users
- Electronic monitoring
- Password guessing (against single user)
- Offline dictionary attacks
- Specific account attacks
- Popular password attacks
- Workstation hijacking
- Exploiting user mistakes
- Exploiting multiple password use
Popular Password Attack
Password Vulnerabilities
Attacker gains unauthorized access by guessing popular passwords
make policies against selection of commonly used passwords (prevent), scan ip address of authentication requests (detect)
Password Guessing (against single user)
Password Vulnerabilities
Guessing against a specific user
min length, character set, training
Electronic monitoring
Password Vulnerabilities
Malware that records every keystroke a user types
Offline dictionary attack
Password Vulnerabilities
Attacker obtains database of hashed passwords and compares them against hash values of commonly used passwords
Access contols (prevent) intrustion detection (detect) rapid reissuance of passwords (respond)
Specific Account Attacks
Password Vulnerabilities
Gathering personal information about a user to guess password
Accout lockout mechanisms
Example of workstation hijacking
Password Vulnerabilities
Attacker accesses a logged-in workstation that was left unattended
Example of Exploiting user mistakes
Password Vulnerabilities
User leaves password on a sticky note on desk
Example of multiple passwords use
Password Vulnerabilities
Attacker gains access to one account and reuses the credentials to access the user’s email or banking accouts
salting helps prevent this!
Online vs. Offline password attacks
Online: Requires interaction with a service or resource
Offline: Works with intercepted or stolen data (password files)
Countermeasures (8)
Password Countermeasures
- Prevent unauthorized password files access
- Intrusion detection measures
- Rapid reissuance of compromised passwords
- Account lockout mechanisms
- Policies against using common passwords and using similar passwords on network devices
- Regular password reissuance
- Training in and enforcement of password policies
- Automatic workstation logout
Account Lockout Mechanisms
Password Countermeasures
The account is locked after a given number of failed attempts
*Has a downside: Can be abused for denial of service attack
Why are passwords the most common authentication technique despite all the vulnerabilities?
- tokens expensive and inconvenient to carry around
- biometrics depend on client side hardware and it requires specific software implemnation on both sides, usually one side reluctant
Why should passwords NEVER be stored “in clear” ?
Password Countermeasures
- Sysadmin could access all user’ passwords
- Intruder would get a very valuable asset
BTW: Never email password!!
What are hashed and salted passwords?
Password Countermeasures
Passwords are transformed using a hash function
with a salt value, or random value added to each password before hashing to make attacks harder
Salt values are stored in the password value in clear