Download - Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

Transcript
Page 1: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

Chapter 6

Authenticating People

Page 2: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F01: Authentication to protect computer resources.

Page 3: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F02: Performing the authentication.

Page 4: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T01: Examples of authentication techniques

Page 5: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T02: Levels of authentication threats

Page 6: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F03: Basic external attacks on authentication.

Page 7: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F04: Unix developers using a teletype.

Reprinted with permission of Alcatel-Lucent USA Inc.

Page 8: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F05: Masking the space for typing a password.

Courtesy of Dr. Richard Smith

Page 9: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F06: Procedure diagram of password hashing.

Page 10: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F07: Procedure diagram of a one-way hash function.

Page 11: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T03: Modern hash functions and the size of their hash values

Page 12: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F08: Keystroke logger.

Photo courtesy of KeyGhost.com

Page 13: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F09: Offline trial-and-error attack on Alice’s password hash.

Page 14: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq01

Page 15: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq02

Page 16: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq03

Page 17: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq04

Page 18: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T04: Search space for random passwords or passphrases

Page 19: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F10: Decimal dice can produce truly random numbers.

Courtesy of Dr. Richard Smith

Page 20: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T05: Different degrees of cracking feasibility

Page 21: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F11: Dictionary attack by the Morris Worm.

Page 22: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq05

Page 23: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq06

Page 24: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F12: A four-digit luggage lock.

Courtesy of Dr. Richard Smith

Page 25: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq07

Page 26: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq08

Page 27: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F13: Passive authentication tokens, front and back.

Courtesy of Dr. Richard Smith

Page 28: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F14: A hand-operated challenge-response token.

Courtesy of Dr. Richard Smith

Page 29: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F15: Using a challenge-response token.

Page 30: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F16: A challenge-response calculation.

Courtesy of Dr. Richard Smith

Page 31: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F17: USB direct connect challenge response tokens.

Courtesy of Dr. Richard Smith

Page 32: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F18: One-time password token.

Courtesy of Dr. Richard Smith

Page 33: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F19: Generating a one-time password.

Courtesy of Dr. Richard Smith

Page 34: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.T06: Vulnerabilities of authentication tokens

Page 35: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.F20: Biometric fingerprint reader on a laptop’s keyboard.

Courtesy of Dr. Richard Smith

Page 36: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

FIGURE 6.0.F21: Elements of a biometric system.

Page 37: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

EQUATION 6.0.Eq09

Page 38: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T07: Household policy for a weak threat environment

Page 39: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T08: Policy for a workplace using passwords against weak threats

Page 40: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T09: Policy for a workplace using tokens and passwords against weak threats

Page 41: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T10: Extending the password policy from Table 6.8 for strong threats

Page 42: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T11: Policy from Table 6.8 extended to apply biometrics to strong threats

Page 43: Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

TABLE 6.0.T12: Extending the token policy from Table 6.9 for strong threats