Identification and Authentication (Lesson 10) Flashcards
3 Methods to Authenticate + 2
3 general methods to authenticate Something you know Something you have Something about you/that you are location dynamic biometrics
Rules for passwords
Don’t pick an easy one to guess
mix upper and lower case, add special characters and numbers
at least 6 characters in length, 8 better, 10 even better
maybe use pass-phrases instead of dictionary words
Don’t write it down
Don’t reuse previous passwords (or just add a # to it)
Change it on a regular basis (but not too often), 45 days.
If you’re the sysadmin, run a password cracker periodically.
If one-time passwords are possible, consider using them (they have their own problems though)
Password management issues
Default accounts Easily guessed or cracked passwords Unpassworded accounts Shared accounts Password aging Password policy enforcement Password auditing Audit frequency Control access to results
One-Time Passwords
User given device that generates a password at certain time intervals (e.g. every minute)
The device is keyed with the server, so that both devices generate the same password at the same time.
If you want to log into the server, look at the display and type in the password you see.
Even if the password is sniffed, it was only good for the minute it was used.
Something you have
Physical keys, magnet cards, smart cards, calculators.
Something about you
Biometrics Voice prints Fingerprint Retinal Scan Hand Geometry Signature analysis
Dynamic Biometrics
captures a dynamic process rather than a static characteristic of a person.
Access Modes Read
allows entity to read the file or view the file’s attributes
List – Access Mode
the entity may view the file’s attributes.
Delete – Access Mode
the entity may remove the file from the system.
Execute – Access Mode
the entity may load the file and run it.
Write – Access Mode
allows the entity to write to the file, which may include creating, modifying, or appending to the file.
Protection Table
Illustrates what access controls are designed to do
File Passwords
In order to gain access to a file the user must present the system with the file’s password.
In order to control the type of access granted to the file, multiple passwords for each file may be necessary.
Capabilities Based Access Controls
Divides the protection table by rows (Object and Permissions columns). Each user has a table.
Associated with each entity is a list of the objects the user may access along with its permissions.