Lec 6: User Authentication Flashcards
What evidence can you provide that you are who you say you are to authenticate a human to a computer?
How do text passwords work? What questions do you need to consider when creating them?
What are the prime move issues?
What are the issues with password choice?
What are the keypoints to “Users are not the enemy” by Adams and Sasse?
What are the unintended consequences of reasonable ideas?
What are the pitfalls in username and password design that make it possible to guess repeatedly?
What were the results of [Morris & Thompson 79] Survey of 3,289 Passwords when there were no constraints on choice of password?
How can users leak their passwords?
How do fake authentication programs work?
How does the Tenex password scheme work?
How do you break Tenex in linear time?
How can passwords be stolen in transit?
How does attacking passwords in memory work?
How does the unix password scheme work?
What is the solution to the Unix password scheme?
How do we know if adding salt is a good solution?
How were Windows 95/98 passwords handled and what was problem with them? How were passwords dealt with in Windows NT/2000/XP?
What are the misc practical issues with passwords?
How does password reset work?