Podcast
Questions and Answers
According to RFC 4949, what is the primary function of user authentication?
According to RFC 4949, what is the primary function of user authentication?
- Granting access to system resources.
- Auditing user activity within a system.
- Encrypting user data for secure storage.
- Verifying an identity claimed by a system entity. (correct)
Which of the following is a fundamental building block and primary line of defense in the authentication process?
Which of the following is a fundamental building block and primary line of defense in the authentication process?
- Data encryption.
- Authentication. (correct)
- User identification.
- Access control lists.
Which of the following authentication methods falls under the category of 'something the individual is'?
Which of the following authentication methods falls under the category of 'something the individual is'?
- Smartcard
- Fingerprint (correct)
- PIN
- Password
Which of these is an example of 'something the individual possesses' for authentication?
Which of these is an example of 'something the individual possesses' for authentication?
What is the initial step in the authentication process?
What is the initial step in the authentication process?
In the context of user authentication, what is the purpose of the 'verification step'?
In the context of user authentication, what is the purpose of the 'verification step'?
According to the NIST SP 800-63-2 E-Authentication Architectural Model, what role does the 'Relying Party (RP)' play?
According to the NIST SP 800-63-2 E-Authentication Architectural Model, what role does the 'Relying Party (RP)' play?
Which of the following is a primary function of the user ID in password authentication?
Which of the following is a primary function of the user ID in password authentication?
Which of the following is a common vulnerability associated with password authentication?
Which of the following is a common vulnerability associated with password authentication?
What is the purpose of 'salt' in the context of storing passwords?
What is the purpose of 'salt' in the context of storing passwords?
In the UNIX password scheme, what is the purpose of the 'slow hash function'?
In the UNIX password scheme, what is the purpose of the 'slow hash function'?
Which of the following algorithms is used by OpenBSD for password hashing?
Which of the following algorithms is used by OpenBSD for password hashing?
What is the main advantage of using a complex password policy?
What is the main advantage of using a complex password policy?
What is the primary goal of a 'reactive password checking' system?
What is the primary goal of a 'reactive password checking' system?
What is the main purpose of a Bloom filter in proactive password checking?
What is the main purpose of a Bloom filter in proactive password checking?
Which of the following is a primary characteristic of memory cards?
Which of the following is a primary characteristic of memory cards?
Which of the following is a key characteristic of smart cards?
Which of the following is a key characteristic of smart cards?
What is the purpose of the PACE protocol in electronic identity cards (eID)?
What is the purpose of the PACE protocol in electronic identity cards (eID)?
In the context of biometric authentication, what does the term 'enrollment' refer to?
In the context of biometric authentication, what does the term 'enrollment' refer to?
What is a 'rainbow table attack' in the context of password security?
What is a 'rainbow table attack' in the context of password security?
What is the significance of 'equal error rate' in biometric authentication systems?
What is the significance of 'equal error rate' in biometric authentication systems?
Which of the following password selection strategies is the MOST effective in preventing users from choosing easily guessable passwords?
Which of the following password selection strategies is the MOST effective in preventing users from choosing easily guessable passwords?
What is the primary advantage of using biometric authentication over traditional password-based systems?
What is the primary advantage of using biometric authentication over traditional password-based systems?
What is the main purpose of the 'verification step' in the context of user biometrics?
What is the main purpose of the 'verification step' in the context of user biometrics?
In the context of remote authentication, what is a 'challenge-response protocol' primarily designed to mitigate?
In the context of remote authentication, what is a 'challenge-response protocol' primarily designed to mitigate?
Which of the following is the most significant risk associated with storing password hashes without salting?
Which of the following is the most significant risk associated with storing password hashes without salting?
What is the primary security benefit of using a 'one-time password' (OTP) in a token-based authentication system?
What is the primary security benefit of using a 'one-time password' (OTP) in a token-based authentication system?
In the context of password security, what is the function of 'password stretching'?
In the context of password security, what is the function of 'password stretching'?
Which of the following is a critical security consideration when implementing biometric authentication in a remote setting?
Which of the following is a critical security consideration when implementing biometric authentication in a remote setting?
How does the use of 'multi-factor authentication' typically enhance the security of user authentication?
How does the use of 'multi-factor authentication' typically enhance the security of user authentication?
Consider a biometric system with a high false match rate. In which application scenario would this system be MOST inappropriate?
Consider a biometric system with a high false match rate. In which application scenario would this system be MOST inappropriate?
Imagine an attacker has successfully gained access to a system's password database, which contains salted and hashed passwords. Which strategy would provide the LEAST benefit in mitigating the attacker's ability to crack the passwords?
Imagine an attacker has successfully gained access to a system's password database, which contains salted and hashed passwords. Which strategy would provide the LEAST benefit in mitigating the attacker's ability to crack the passwords?
A system administrator discovers that an employee has written their password on a sticky note attached to their monitor. Which of the following security measures would BEST address this specific vulnerability?
A system administrator discovers that an employee has written their password on a sticky note attached to their monitor. Which of the following security measures would BEST address this specific vulnerability?
How does salting passwords protect against attackers who have obtained a database of password hashes?
How does salting passwords protect against attackers who have obtained a database of password hashes?
What is the purpose of using multiple hash functions in Bloom filters for proactive password checking?
What is the purpose of using multiple hash functions in Bloom filters for proactive password checking?
A company decides to implement a biometric system for employee access. Which factor should have the highest priority when selecting a specific biometric method?
A company decides to implement a biometric system for employee access. Which factor should have the highest priority when selecting a specific biometric method?
How can a 'Denial of Service' attack specifically target a user authentication service?
How can a 'Denial of Service' attack specifically target a user authentication service?
Which statement correctly describes the relationship between 'false match rate' and 'false non-match rate' in a biometric system, and their impact on security?
Which statement correctly describes the relationship between 'false match rate' and 'false non-match rate' in a biometric system, and their impact on security?
Which type of authentication is inherently the LEAST secure against replay attacks if not properly implemented?
Which type of authentication is inherently the LEAST secure against replay attacks if not properly implemented?
A web application uses only client-side JavaScript to validate a user's inputted password. Why is this PRACTICE extremely dangerous?
A web application uses only client-side JavaScript to validate a user's inputted password. Why is this PRACTICE extremely dangerous?
A company is implementing a password policy that requires users to change their passwords every 90 days. What potential negative consequence should the security team consider?
A company is implementing a password policy that requires users to change their passwords every 90 days. What potential negative consequence should the security team consider?
Flashcards
User Authentication
User Authentication
Verifying an identity claimed by or for a system entity.
Identification step
Identification step
Presenting an identifier to the security system.
Verification step
Verification step
Presenting or generating authentication information that confirms the binding between the entity and the identifier.
Authentication by knowledge
Authentication by knowledge
Signup and view all the flashcards
Authentication by possession
Authentication by possession
Signup and view all the flashcards
Authentication by Static Biometrics
Authentication by Static Biometrics
Signup and view all the flashcards
Authentication by Dynamic Biometrics
Authentication by Dynamic Biometrics
Signup and view all the flashcards
Password Authentication
Password Authentication
Signup and view all the flashcards
Dictionary Attacks
Dictionary Attacks
Signup and view all the flashcards
Rainbow Table Attacks
Rainbow Table Attacks
Signup and view all the flashcards
John the Ripper
John the Ripper
Signup and view all the flashcards
Complex Password Policy
Complex Password Policy
Signup and view all the flashcards
Password File Access Control
Password File Access Control
Signup and view all the flashcards
User Education (passwords)
User Education (passwords)
Signup and view all the flashcards
Computer Generated Passwords
Computer Generated Passwords
Signup and view all the flashcards
Reactive Password Checking
Reactive Password Checking
Signup and view all the flashcards
Complex Password Policy
Complex Password Policy
Signup and view all the flashcards
Proactive Password Cracker
Proactive Password Cracker
Signup and view all the flashcards
Bloom Filter
Bloom Filter
Signup and view all the flashcards
Token-Based Authentication
Token-Based Authentication
Signup and view all the flashcards
Memory cards
Memory cards
Signup and view all the flashcards
Smart Tokens
Smart Tokens
Signup and view all the flashcards
Smart Cards
Smart Cards
Signup and view all the flashcards
Electronic Identity Cards (eID)
Electronic Identity Cards (eID)
Signup and view all the flashcards
Password Authenticated Connection Establishment (PACE)
Password Authenticated Connection Establishment (PACE)
Signup and view all the flashcards
Biometric Authentication
Biometric Authentication
Signup and view all the flashcards
Remote User Authentication
Remote User Authentication
Signup and view all the flashcards
Eavesdropping (attack)
Eavesdropping (attack)
Signup and view all the flashcards
Denial-of-Service
Denial-of-Service
Signup and view all the flashcards
Trojan Horse (authentication)
Trojan Horse (authentication)
Signup and view all the flashcards
Replay Attack
Replay Attack
Signup and view all the flashcards
Study Notes
User Authentication
- RFC 4949 defines user authentication as the process of verifying an identity claimed by or for a system entity.
- It is a fundamental building block and primary line of defense,
- It is the basis for access control and user accountability.
Authentication Process
- It involves an identification step and a verification step.
- The identification step presents an identifier to the security system.
- The verification step presents or generates authentication information confirming the binding between the entity and the identifier.
Means of Authenticating User Identity
- Something the individual knows, such as a Password, PIN, or answers to prearranged questions.
- Something the individual possesses (token), such as a smartcard, electronic keycard, or physical key.
- Something the individual is ( static biometrics), such as a fingerprint, retina, or face.
- Something the individual does (dynamic biometrics), such as a voice pattern, handwriting, or typing rhythm.
Password Authentication
- Widely used line of defense against intruders.
- The user provides a name/login and password.
- The system compares the provided password with the one stored for that specified login.
- The user ID determines authorization to access the system, the user's privileges, and discretionary access control.
Password Vulnerabilities
- Offline dictionary attacks.
- Password guessing against a single user.
- Workstation hijacking.
- Electronic monitoring.
- Specific account attacks.
- Popular password attacks.
- Exploiting user mistakes.
- Exploiting multiple password use.
UNIX Password Scheme
- When loading a new password, a salt is combined with the password and fed into a slow hash function.
- The output is stored in the password file along with the user ID and salt.
- To verify a password, the system selects the user ID, salt, and hash code from the password file.
- combines the provided password with the salt, applies the slow hash function, and compares the result to the stored hash code.
UNIX Implementation
- An original scheme involves up to eight printable characters in length,
- It involves a 12-bit salt used to modify DES encryption into a one-way hash function,
- It involves a zero value repeatedly encrypted 25 times, and translated into an 11-character sequence.
- The original scheme with printable characters is now regarded as inadequate but is required for compatibility in existing systems.
Improved Implementations
- A recommendation of the hash function suggests basing it on MD5 with a salt of up to 48 bits.
- An improved implementation's password length is unlimited and it produces a 128-bit hash.
- A loop of 1000 iterations is used to achieve slowdown.
- OpenBSD uses Blowfish block cipher-based hash algorithm called Bcrypt.
- Bcrypt is the most secure version of Unix hash/salt scheme,
- It uses a 128-bit salt to create a 192-bit hash value.
Password Cracking
- Dictionary attacks involve developing a large dictionary of possible passwords and trying each one against the password file.
- Each password must be hashed using each salt value and then compared to stored hash values.
- Rainbow table attacks pre-compute tables of hash values for all salts, creating a large table of hash values.
- Can be countered by using a sufficiently large salt value and a sufficiently large hash length
- Password crackers exploit the fact that people choose easily guessable passwords.
- Shorter password lengths are also easier to crack.
- John the Ripper is an open-source password cracker that was developed in 1996.
- A combination of brute-force and dictionary techniques are used.
Modern Approaches to Passwords
- A comples password policy should force users to pick stronger passwords.
- Password-cracking techniques have also improved drastically, where there is an increase of the processing capacity,
- The use of sophisticatedalgorithms, and study of actual passwords in use.
Password File Access Control
- Offline guessing attacks are prevented by denying access to encrypted passwords.
- The weaknesses in the OS ,Accidents related to permissons, , users having multiple accounts, and access through media or network traffic may lead to vulnerabilities.
Password Selection Strategies
- User education is recommended to promote the usage of hard-to-guess passwords and selecting guidelines for selecting strong passwords.
- Computer generated passwords cause trouble with the users remembering them.
- Reactive password checking can take form when the system peridically runs its own password cracker to find guessable passwords.
- Complex password policies, where the user is allowed to select their own password is encouraged, however is checked by a system where otherwise will reject the password.
Proactive Password Checking
- An effective password checker technique that rejects a word on a list that has been implemented on systems.
- Password Cracker - Compile a large dictionary of passwords
- Rule enforcement - apply multiple rules that passwords must adhere to
- Bloom Filter - Use dictionary table and hashes to check desired password
Token-Based Authentication
- Used with memory cards, smart cards, and electronic identity cards.
Types of Cards
- Embossed cards typically used on old credit carts, Raised characters only, on front.
- Magnetic Stripe Cards, Magnetic bar on characters on front.
- Memory Cards, Electrical Memory inside, could be used for a prepaid phone card.
- Smart contact Cards, Electricial memory and processor inside, electrical contacts exposed on surface.
- Smart contacless cards, Radio Attenna Embedded inside.
Memory Cards
- They can store but not process data.
- The most common is the magnetic stripe card.
- They can include internal electronic memory, and can be used alone for physical access such as hotel rooms and ATMs.
- Provides significantly greater security when combined with a password or PIN.
- Drawbacks are that this requires a special reader, loss of the token, and user dissatisfaction if used for computers.
Smart Tokens Physical Characteristics
- Include an embedded microprocessor.
- A smart token looks like a bank card and can look like calculators, keys, small portable objects.
- Interfaces can be Manual which includes the keypad for interface, or electronic where it communicates/reads data
Smart Tokens Authentication
- Static Authentication
- Dynamic password generator
- Challange-Response
Smart Cards
- Most important category of smart token, it has the appeareance of a credit card, and an electronic interface.
- Includes an entire microprocessor, with an I/O port
- Stores read-only memory (ROM), and electrically erasable progrqammable ROM (EEPROM), and RAM
Smart Card Activation
- Activated through an ATR (answer to reset) followed by a protocal called PTS.
Electronic Identity Cards (eID)
- Serves as a national identity card, driver's license, for access to commercial services.
- Provides stronger proof of identity and a wider variety of applications.
- Is a smart card that has been verified by the national government as valid and authentic.
- A key example is the German Card, which has a readable data prinited such as Name and Birthdate.
Password Authenticated Connection Establishment (PACE)
- Ensures that contactelss RF chips cannot be reead without explicit access control
- Online applications need acess that is established with a 6-digit PIN
- Offline applications use an MRZ code on the back, or 6-digit card (CAN) on the front.
Electronic Functions and Data for eID Cards
- ePass: Reserved for government usage with biometric functions
- eID: Stores identity records that require cardholder permissons
- eSign: Certifcation with electronic signatures.
Biometric Authentication
- Attempts to authenticate individuals based on unique physical characteristics based on patter recognition.
- Is technically complex and expensive than passwords or tokens,
- Physical characteristics such are Iris, Fingerprins, Hand geometry and voice.
Biometric Profiles
- Biometrics work by measure profile types such as an inputer profile, genuir profile, average score and matching scores.
High Security Applications
- A high security application may require a very low false match rate.
Forensic Applications
- For forensic applications, require low false non-match rates.
Remote User Authentication
- Authentication over the internet or a communications link is more complex
- Adds Security threats; eavesdropping, capturing passwords, replaying authentification sequence
- Requires relies some form of challange-response
Authentification and Security Issues
- Includes Denial of Services, Eveasdropping, Trojan Horses, Client Attacks, Host Attacks and Replay.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.