Lecture 6 - Authentication Flashcards
What is Authentication
They are who they say they are & they are permitted to access
TOCTTOU
Time of check to time of use.
Repeated authentication.
At start, during a session.
What is Passwords
Digital keys,
Problems with passwords
People forget them Can be guessed Spoofing and Phishing Keylogging Compromised password files Weak Passwords
Password Policies
Certain length and type of char
no dictionary words
regularly change
no previously used passwords
Storing Passwords
One-way hash functions
Cant be looked up by admin
Stored in shadow file, read protected.
Types of password attacks
Online - on login terminals (phishing)
Offline - When password hash is obtained (brute force)
Dictionary Attacks - uses of common words.
Pretexting - obtaining private details by offering some pretext as a reason for needing them.
Password Salting
Adding a random “salt” before hashing.
Assign random salt for each user
Prevent massive leaks.
2-Factor Authentication
Text codes to mobile
Google authenticator
USB Device
TOCTTOU
Password Alternatives
Biometrics - trade off between false +/-. accuracy is improtant
Location - not reliable on its own.