Podcast
Questions and Answers
What is the primary goal of computer security?
What is the primary goal of computer security?
What is the difference between identification and authentication?
What is the difference between identification and authentication?
What type of authenticator is based on a physical characteristic of the user?
What type of authenticator is based on a physical characteristic of the user?
What is an example of something a user knows?
What is an example of something a user knows?
Signup and view all the answers
Why should authentication be reliable?
Why should authentication be reliable?
Signup and view all the answers
What is the purpose of authentication?
What is the purpose of authentication?
Signup and view all the answers
What is an example of something you might use to identify yourself?
What is an example of something you might use to identify yourself?
Signup and view all the answers
What is the relationship between identification and authentication?
What is the relationship between identification and authentication?
Signup and view all the answers
What type of personal information may a user derive their password from?
What type of personal information may a user derive their password from?
Signup and view all the answers
What is the primary goal of an exhaustive or brute force attack?
What is the primary goal of an exhaustive or brute force attack?
Signup and view all the answers
How many possible passwords are there in a system with 8-character passwords using only the letters A-Z?
How many possible passwords are there in a system with 8-character passwords using only the letters A-Z?
Signup and view all the answers
What is the benefit of using characters other than just a-z in passwords?
What is the benefit of using characters other than just a-z in passwords?
Signup and view all the answers
At what length does the combinatorial explosion of password guessing difficulty begin?
At what length does the combinatorial explosion of password guessing difficulty begin?
Signup and view all the answers
Why do penetrators often try the easy cases first?
Why do penetrators often try the easy cases first?
Signup and view all the answers
What is the primary benefit of choosing long passwords?
What is the primary benefit of choosing long passwords?
Signup and view all the answers
Why do users often use weak passwords?
Why do users often use weak passwords?
Signup and view all the answers
What is a common method of authentication that involves something a user has?
What is a common method of authentication that involves something a user has?
Signup and view all the answers
What is the primary purpose of a password in user authentication?
What is the primary purpose of a password in user authentication?
Signup and view all the answers
What is a disadvantage of using passwords for authentication?
What is a disadvantage of using passwords for authentication?
Signup and view all the answers
What happens when a user discloses their password to an unauthorized individual?
What happens when a user discloses their password to an unauthorized individual?
Signup and view all the answers
What is a consequence of changing a password to re-protect an object?
What is a consequence of changing a password to re-protect an object?
Signup and view all the answers
What is a problem with revoking a user's access right to an object?
What is a problem with revoking a user's access right to an object?
Signup and view all the answers
What is a potential problem with lost or forgotten passwords?
What is a potential problem with lost or forgotten passwords?
Signup and view all the answers
What is an advantage of combining two or more forms of authentication?
What is an advantage of combining two or more forms of authentication?
Signup and view all the answers
What is a limitation of passwords as protection devices?
What is a limitation of passwords as protection devices?
Signup and view all the answers
What is a common weakness in user-chosen passwords?
What is a common weakness in user-chosen passwords?
Signup and view all the answers
What is a type of attack that can be used to infer a user's password?
What is a type of attack that can be used to infer a user's password?
Signup and view all the answers
What is a countermeasure against weak passwords?
What is a countermeasure against weak passwords?
Signup and view all the answers
What type of software is available to scan a system for weak passwords?
What type of software is available to scan a system for weak passwords?
Signup and view all the answers
What is a type of password that is easily guessed by an attacker?
What is a type of password that is easily guessed by an attacker?
Signup and view all the answers
Why do administrators often need to assign a new password to a user?
Why do administrators often need to assign a new password to a user?
Signup and view all the answers
What is the purpose of password recovery software?
What is the purpose of password recovery software?
Signup and view all the answers
What is necessary to achieve true security in authentication?
What is necessary to achieve true security in authentication?
Signup and view all the answers
Why might limiting users to certain workstations or times of access cause complications?
Why might limiting users to certain workstations or times of access cause complications?
Signup and view all the answers
What is an advantage of limiting users to certain workstations or times of access?
What is an advantage of limiting users to certain workstations or times of access?
Signup and view all the answers
What is the goal of security analysts in recognition of normal activity?
What is the goal of security analysts in recognition of normal activity?
Signup and view all the answers
What is an example of using additional information to authenticate users?
What is an example of using additional information to authenticate users?
Signup and view all the answers
Why might someone try to impersonate a user like Adams?
Why might someone try to impersonate a user like Adams?
Signup and view all the answers
What is the benefit of using techniques like limiting access to certain workstations or times?
What is the benefit of using techniques like limiting access to certain workstations or times?
Signup and view all the answers
What is the trade-off of using techniques like limiting access to certain workstations or times?
What is the trade-off of using techniques like limiting access to certain workstations or times?
Signup and view all the answers
Study Notes
Inferring Passwords Likely for a User
- A user may use a password derived from well-known personal information, such as:
- The same as the user ID
- Is, or is derived from, the user's name
- A common word list (e.g., password, secret, private) plus common names and patterns (e.g., qwerty, aaaaaa)
Exhaustive Attack (Brute Force Attack)
- In an exhaustive or brute force attack, the attacker tries all possible passwords, usually in an automated fashion.
- The number of possible passwords depends on the implementation of the particular computing system.
- For example, if passwords are words consisting of 26 characters (A-Z) and can be of any length from 1 to 8 characters, there are 26^1 + 26^2 + ... + 26^8 = 5 * 10^12 possible passwords.
Good Passwords
- To improve password security, use practices such as:
- Using characters other than just a-z (e.g., digits, uppercase and lowercase letters)
- Choosing long passwords, as the combinatorial explosion of password guessing difficulty begins around length 4 or 5
Authentication
- Human authentication involves recognition of someone's identity, often based on familiar characteristics (e.g., face, voice).
- Computer authentication involves controlled access, where someone is authorized to take some action on something.
- Authentication is the act of proving that asserted identity, that the person is who they say they are.
Identification versus Authentication
- Identities are often well-known, predictable, or guessable (e.g., user ID, name, bank account number, email address).
- Authentication should be reliable and private.
- Authentication mechanisms use any of three qualities to confirm a user's identity:
- Something the user knows (e.g., passwords, PIN numbers, passphrases).
- Something the user is (e.g., biometrics, such as a fingerprint, voice pattern, or face).
- Something the user has (e.g., identity badges, physical keys, driver's license).
Authentication Based on Phrases and Facts
- User authentication and verification using passwords:
- A user enters a piece of identification (e.g., name, user ID).
- The system requests a password from the user.
- If the password matches, the user is authenticated and allowed access.
Attacking and Protecting Passwords
- Passwords are limited as protection devices due to the relatively small number of bits of information they contain.
- People often pick passwords that do not take advantage of the available bits (e.g., choosing a well-known string, such as qwerty or password).
- Dictionary attacks can be used to infer user passwords.
- Countermeasures include:
- Posting dictionaries of phrases and specialized lists to identify weak passwords.
- Using utilities like COPS Crack and SATAN to scan a system for weak passwords.
- Password recovery software.
Secure Authentication
- To achieve true security, consider the problem, tools, and possible attacks.
- Additional information can be used to authenticate users, such as:
- Time of access (e.g., limiting access to specific hours or days).
- Physical location (e.g., limiting access to specific workstations or offices).
- Limiting users to certain workstations or times of access can cause complications, but may provide added security.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Learn about common password derivation methods and exhaustive attack techniques used to compromise password security.