MODULE 3 Flashcards
User authentication:
Establishing confidence in user identities
Claimant:
A party to be authenticated
User authentication methods:
- Password-based
- Token-based
- Static biometrics
- Dynamic biometrics
Risk assessment for user authentication:
- Assurance level
- Potential impact
- Areas of risk
Password vulnerabilities:
- Popular password attack
- Offline dictionary attack
- Workstation hijacking
- Guessing password against single user
- Exploiting user mistakes
- Exploiting multiple password use
- Specific account attack
- Electronic monitoring
Countermeasures for password vulnerabilities:
- Intrusion detection
- Encrypted networks
- Policies against common passwords
- Account lockout
- Stop unauthorized access to password file
- Training
- Automatic logout
Need for a salt value:
- Prevent duplicates in password file
- Increase difficulty of offline dictionary attack
Dictionary attack:
Comparing each word in a dictionary against hash in password file
John the Ripper:
Open-source password cracker that combines brute-force and dictionary techniques
Rainbow table:
A large dictionary of possible passwords and all salt values hashes of them
Password file access control vulnerabilities:
- Exploit OS bug
- Permission accident
- Users reusing passwords
- Unprotected backup
- Unprotected networks
Drawbacks of memory cards:
- Needs special readers
- Loss of token
- User dissatisfaction
Techniques for better passwords:
- User education
- Computer-generated passwords
- Reactive password checking (periodic)
- Proactive password checking (at selection)
Smartcard authentication types:
- Static
- Dynamic
- Challenge-response
Biometric authentication:
Authenticate user based on physical characteristics