Identity and Authentication Flashcards

1
Q

Introduction on Identity and Authentication

A

The most basic security operation
- Information access
- Permissions for different operations
It’s also surprisingly subtle
- Approaches
- Users and computers
- The trade-off between security and usability
- Attacks we need to consider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Notes on Identifying users

A

Relates to several concepts
- Claiming an identity
- Assigning permissions to a claimed identity
Different Identities
- Depends on how we want to operate.
- As an individual, as a person fulfilling a role, …
- As a proxy for someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Notes on Identifying computers

A

Increasingly at least (or more) important.
- What is the right meaning of “identity” for a computer?
Also different roles.
- As a service provider: computer convinces user (or user agent) it is who it says it is.
- As an agent: computer operates on behalf of a user.
- As a server: computer only deals with the other computers it expects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name three methods of authentication?

A
  1. Passwords
  2. Multi-factor authentication (example: 2FA)
  3. Biometrics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the benefits and drawbacks of Passwords?

A

Benefits:
- “Something you know” (and only you know)
- The more complex the password, the harder to crack it.
Drawbacks:
- Might forget the password
* Subject to the limitations of the human memory
- Needs to be unpredictable
* Weaker passwords are easier to crack. Because of the strengths of computers at trying lots of combinations.
- Replay: If we get the password once, we can simply replay it against the service we want to attack. Possession of the password is sufficient to authenticate.
- Re-use: People often use passwords on multiple services. They’re hard to remember – and the more secure they are, the harder they become.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is meant by Entropy in relation to passwords?

A

Meaning: A way to measure how unpredictable a password is, and how difficult it would be to guess or crack.

Key-Note: A High entropy means a more complex password that’s harder to break.

Note: High entropy = high disorder, or a high level of randomness, or a high level of unpredictability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name three methods for generating passwords?

A
  • Leetspeak:
    • Replacing leets with special characters, to spell modified words.
    • Classic example of security through obscurity (details are kept hidden and vulnerabilities are not known or are difficult to detect)
  • Random passwords:
    • randomise a password of length n.
    • This lack of information gain provides the security.
    • Still need a long password, hard to memorize.
  • Words
    • password made up of random words
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can we crack a password?

A
  1. Brute Force Attack
    - Try every possible combination of the password.
  2. Key Loggers
    - A form of malware that logs all the keys that a user enters.
    - Doesn’t matter how complicated the password is if we can get its plaintext.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is meant by Multi-Factor Authentication (MFA)?

A

Meaning: A method that requires more than one factor to authenticating a user.

Note: Compared with passwords, in which a single successful attack is needed, MFA increases complexity by adding multiple factors.
- Several things needed in order to authenticate
- Require more attacks to be successful
- Make the factors independent: knowing one doesn’t leak information about the others
- Feedback to the user when one factor is used

Example: 2FA
- Requires two factors to authenticating a user
- Two attack vectors, two instances of carelessness, doesn’t mean it can’t happen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the factors in a MFA

A

Physical:
- A hardware token such as a swipe card, contactless (NFC) card, USB dongle, etc.

Digital/Mental
- Password
- PIN
- Memorable Date
- Some letters from a memorable word.

Example:
- Supply username and password
- Supply second factor
- Phone call, code from text message, hardware dongle, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main negative of MFA?

A

Possibly having too many factors:
- More is not always better
- Relates to usability – but in doing so opens a security hole by hitting human limitations

Note: Policies need to be aware of this.
- If you mandate people can’t write things down, don’t ask them to use things they can’t remember.
- If you need a second factor, make sure there are options (or accept that people will get locked out).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by biometric in relation to security?

A

Meaning: a method for identification and authentication that uses physical traits to verify a user’s identity.

Note: “Something you bring, something you know”
- Since you always bring yourself, using something that’s intrinsic to you is attractive.
- Harder to fake.

Example: Fingerprints and faces
- Fingerprints and faces are unique.

Vulnerabilities:
- Both approaches are based on an image of a person, not actually on the person themselves directly.
- Encoded representation of a core personal attribute

Attacks:
- Once the encoding has been found, it can be leveraged.
- Lookalikes, fake fingerprints
- Hack the camera taking the image
- Hold the camera to the person’s face/finger.

Note: Remember we’re working with an image of a physical attribute, not the attribute itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Notes on Identity and Authentication

A

Can we do without any computer-based authentication?

Perhaps if having physical access to the computer is enough.
- The security is all done outside the digital realm
- Air-gapped machine (no remote access)
- Inside a secure facility such as a SCIF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Summary of Identity and Authentication.

A

Authentication is a great example of a sociotechnical problem
- Technological solutions embedded into a human social system, and faced with human constraints
- Limits the complexities of methods
Multiple factors can help – but only if designed with this in mind
- Independence of attacks, protect against subtle attacks like replays and hazards like re-use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly