Password-based authentication Flashcards
What are the advantages of password-based authentication?
- It is a very convenient way to authenticate a user trying to access a system.
What are the disadvantages of password-based authentication?
- It is vulnerable to brute force or dictionary attacks depending on the strength of the password.
- It puts security in the hands of the user, so the strength of the security is dependent on the user choosing a strong password.
How do you choose a good password?
- Easy to remember but hard to guess.
- Length of 6-9 characters.
- A mix of letters, numbers and special characters.
- Avoid dictionary words.
- Use different passwords for different accounts.
- Change passwords on a regular basis (maybe every 3 months).
Why are password selection policies hard to enforce/why is password-based authentication the weakest link?
- Humans have limited capacity for memory therefore it is natural to choose a password that is easy to remember. However, this is in conflict with the requirements of a strong password.
- Passwords can be vulnerable to dictionary attacks depending on how strong the passwords are.
- The user could be willfully ignorant of information security or complacent, and therefore ignore selection password policies.
What is biometrics authentication?
It is the use of biological signatures to authenticate a person trying to access a system. It is verifying your identity based on what you are as opposed to what you know or what you possess.
What are the 2 main types of biometrics authentication methods?
- Behavioral (e.g. voice, signature)
- Physiological (e.g. iris, fingerprint)
What are the 2 processes involved in biometrics authentication?
- Identification - Who are you? One-to-many comparison against biometric samples in database
- Verification - Are you who you claim to be? One to one comparison against previous stored templates for the user.
How long does it take to crack a password?
For a password of x length and y possible characters:
No. of combinations = y^x
Using a computer that can perform z operations per unit time:
Time taken to crack = (y^x)/z