Chapter 7: Case Study Flashcards

1
Q

What are the problems with passwords?

A

Security problems: physhing, social engineering, spyware

Poor usability: memorize, type, complex policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are passwords still dominant if they have so many problems?

A
  • laziness

- Failure of research on convincingly better alternatives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are biometrics an alternative?

A
  • Who you are provides you the key

- But low accuracy and new attacks (using the fingerprint of a sleeping person)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the alternatives to passwords?

A

Something you…

Are: Easy to use but lower security (fingerprint, face)

Know: Password / Questions

Have: low usability but higher security (USB key, Smart Card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Improvements to passwords (federated AuthN) Single Sign On

A

+ better usability for user
+ Complexity and cost reduction (Economies of scale) for Service provider and identity provider

User authenticate only once and gain access to many services

But: we still need to manage multiple passwords/credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Improvements to passwords: Password Managers

A

A software app that aids users in creating, storing & organizing passwords

Components:

  • local database
  • browser plugins
  • cloud server storage
  • master key
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the functions of a password manager?

A
  • Generate secure passwords
  • Password strength meter
  • Password storage
  • Automatic fill-in
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the best alternative to passwords?

A
  • It depends on the context
Scenario 1:
Location: Home
application: low risk
Beacons: familiar device
-> all authentication mechanisms are ok

Scenario 2:
Location: Public place
Application: Sensitive
–> use a combination of secure mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the definition of adaptive authentication?

A
  • intelligent system selects best mechanism dynamically, depending on the context
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does adaptive authentication complement PM / Federated AuthN or is it an alternative?

A
  • It complements the federation standards
    1. Mile use adaptive authN
    2. Mile Federation Standards
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the adaptive authentication concept PICO

A
Goal: No passwords
Proposal: HW token (Pico)
- addresses all types of PIN/password
- Scales to thousands of passwords
- Allow continuous authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is PICO designed?

A
  • 2 buttons (pairing and login)
  • display / camera (implemented via smartphone)
  • Database with all user credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the states of PICO?

A
  • Imprintable
  • Unlocked
  • Locked
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain the concept of progressive authentication

A

Scope: User to apps
Authenticators: Multifactor (face, voice, proximity, placement, PIN)
Context: Battery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the CASA concept

A
  • Context-Aware Scalable Authentication
  • Choose authentication mechanism {PIN, Password} based on contextual factors: Location {Home, Work, Other}
  • > User spent most of the time at home/work (safe places)
  • > 60% of logins occur in safe places
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the CYOA (Choose your own authentication) concept

A

Scope: User to web app
Authenticators: password, persuasive cued passwords, object pass tiles, persuasive cued clickpoints
Context: Security & usability

17
Q

Explain the CORMORANT concept

A

Scope: User to device
Authenticators: face, gait
Context: proximity to other user devices

18
Q

Explain the commercial Product Google Smartlock

A
  • Unlock Smartphone in presence of other user devices (smart watch)
  • Passwords are remembered for websites and apps
  • Laptop is unlocked in presence of users unlocked smartphone
19
Q

What are the common challenges with adaptive authentication?

A

key problems -> ad-hoc designs

  • Hard to extend / re-configure
  • Difficult to reproduce, to compare
  • Once deployed become static, costly for companies to change
20
Q

How to design more comprehensive, versatile & flexible Adaptive Authentication systems?

A
  • Follow Adaptive Systems modelling principles (autonomous driving)
  • Generic reference architecture & implementation
21
Q

How to make adaptive authentication more flexible ?

A

Develop a flexible and easy to reconfigure system for: authenticators, contexts, and selection algorithms that selects the authenticators

  • Use standard protocol for the sensors and effectors
  • Use Standard Interface for authenticators and context
22
Q

Which research questions are still open in the area of adaptive authentication?

A
  • incorporate new authenticators
  • Integrate Integrate with applications
  • incorporate context and selection algorithms in the planner (reports usability & security)