Who are you? Enter userid and password. Means of Authentication. Authentication 2/19/2010 COMP Authentication is the process of verifying that

Similar documents
Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/1516/ Chapter 4: 1

Undergraduate programme in Computer sciences

Web Security, Summer Term 2012

Web Security, Summer Term 2012

Session objectives. Identification and Authentication. A familiar scenario. Identification and Authentication

Authentication. Chapter 2

What is Authentication? All requests for resources have to be monitored. Every request must be authenticated and authorized to use the resource.

CSE 565 Computer Security Fall 2018

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2

Instructions 1. Elevation of Privilege Instructions. Draw a diagram of the system you want to threat model before you deal the cards.

Authentication Security

User Authentication. Modified By: Dr. Ramzi Saifan

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

===============================================================================

Computer Security 3/20/18

Computer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Instructions 1 Elevation of Privilege Instructions

What is a security measure? Types of security measures. What is a security measure? Name types of security measures

MANAGING LOCAL AUTHENTICATION IN WINDOWS

MODULE NO.28: Password Cracking

CS530 Authentication

Instructional Guide for Password Reset Functionality (CYBER Release 1.21)

User Authentication. Modified By: Dr. Ramzi Saifan

Microsoft Exam Security fundamentals Version: 9.0 [ Total Questions: 123 ]

Operating systems and security - Overview

Operating systems and security - Overview

(2½ hours) Total Marks: 75

Tennessee Technological University Policy No Password Management

ESS Security Enhancements

Sysco Market Login Help

10/1/2015. Authentication. Outline. Authentication. Authentication Mechanisms. Authentication Mechanisms. Authentication Mechanisms

Worksheet - Reading Guide for Keys and Passwords

Password. authentication through passwords

What is Eavedropping?

T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A. Authentication EECE 412. Copyright Konstantin Beznosov

CIS 6930/4930 Computer and Network Security. Topic 6. Authentication

A Model to Restrict Online Password Guessing Attacks

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

PASSWORD POLICIES: RECENT DEVELOPMENTS AND POSSIBLE APPRAISE

Authentication SPRING 2018: GANG WANG. Slides credit: Michelle Mazurek (U-Maryland) and Blase Ur (CMU)

CompTIA FC0-U51. CompTIA IT Fundamentals.

Frequently Asked Questions on One Page Internet Banking

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

Define information security Define security as process, not point product.

Passwords. EJ Jung. slide 1

Authentication. Overview of Authentication systems. IT352 Network Security Najwa AlGhamdi

Authentication Methods

HY-457 Information Systems Security

Outline Key Management CS 239 Computer Security February 9, 2004

CNT4406/5412 Network Security

Secure Recipient Guide

Lecture 9. Authentication & Key Distribution

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

Other Uses of Cryptography. Cryptography Goals. Basic Problem and Terminology. Other Uses of Cryptography. What Can Go Wrong? Why Do We Need a Key?

MyRRMed User Manual. User Manual. Rev. October Rev. October

Security Handshake Pitfalls

COMPUTER PASSWORDS POLICY

Security and Privacy

Authentication. Murat Kantarcioglu

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

CSCE 548 Building Secure Software Entity Authentication. Professor Lisa Luo Spring 2018

5-899 / Usable Privacy and Security Text Passwords Lecture by Sasha Romanosky Scribe notes by Ponnurangam K March 30, 2006

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Security and Privacy in Computer Systems. Lecture 7 The Kerberos authentication system. Security policy, security models, trust Access control models

Welcome Guide for KT Series Token

Area Access Manager User Guide

Security Handshake Pitfalls

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

SE420 Software Quality Assurance

1.264 Lecture 27. Security protocols Symmetric cryptography. Next class: Anderson chapter 10. Exercise due after class

Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Symbolic Links 4. Deploy A Firewall 5

Systems and Principles Unit Syllabus

1 Identification protocols

Lord of the Rings J.R.R. TOLKIEN

HumanAUT Secure Human Identification Protocols

Introduction to Information Security Prof. V. Kamakoti Department of Computer Science and Engineering Indian Institute of Technology, Madras

In this unit we are continuing our discussion of IT security measures.

LOGIN SERVICE SECURITY

CSC 474 Network Security. Authentication. Identification

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

MU2b Authentication, Authorization and Accounting Questions Set 2

Authentication KAMI VANIEA 1

Keywords security model, online banking, authentication, biometric, variable tokens

Cristina Nita-Rotaru. CS355: Cryptography. Lecture 17: X509. PGP. Authentication protocols. Key establishment.

Protecting Information Assets - Week 10 - Identity Management and Access Control. MIS 5206 Protecting Information Assets

Authentication Objectives People Authentication I

Lecture 3 - Passwords and Authentication

5. Authentication Contents

TripSource: Profile Manager

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Assessment 1 Task 3 Explain the following security risks SQL Injection Cross Site Scripting XSS Brute Force Attack/Dictionary Attack

Cryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology

Systems Analysis and Design in a Changing World, Fourth Edition

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

Distributed Systems. Lecture 14: Security. 5 March,

Authentication. Steven M. Bellovin January 31,

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Post-Class Quiz: Access Control Domain

Transcription:

Who are you? Authentication COMP620 Authentication is the process of verifying that the user or system is who they claim li to be. A system may be acting on behalf of a given principal. Authentication differs from authorization which is the process of verifying that an authenticated subject has the authority to perform a given action. Means of Authentication What you know What you have Where you are What you are What you can do Enter userid and password Most systems use simple authentication The first step is called identification. You announce who you are. The second step is called authentication. You prove that you are who you claim to be. COMP620 1

Problems with Passwords Authentication by password is widely accepted and not too difficult to implement. Managing password security can be quite expensive; obtaining a valid password is a common way of gaining unauthorised access to a computer system. Typical issues that need to be addressed: how to get the password to the user, forgotten passwords, password guessing, password spoofing, compromise of the password file. Authenticating a Remote User Do not give the password to the caller but call back an authorized phone number from your files Call back someone else, e.g. the caller s manager or local security officer Send passwords that are valid only for a single log in request so that the user has to change immediately to a password not known by the sender Send mail by courier withpersonal delivery 6 Resetting Passwords When setting up a new user account some delay in getting the password may be tolerated. If you have forgotten your password but are in the middle of an important task you need instant help. The procedures for resetting a password are the same as mentioned previously, but now instant reaction is desirable. In global organisations a hot desk has to be available round the clock. Password support can become a major cost factor Proper security training has to be given to personnel at the hot desk. 7 Guessing Passwords Exhaustive search (brute force): Try all possible combinations of valid symbols up to a certain length. Dictionary attack tries all passwords from an on line dictionary. You cannot prevent an attacker from accidentally guessing a valid password, but you can try to reduce the probability of a password compromise. 8 COMP620 2

Strong Passwords Avoiding Brute Force Attacks Password length: to slow down exhaustive search, prescribe a minimal i password length Password format: mix upper and lower case symbols and include numerical and other nonalphabetical symbols in your password Long complex passwords are hard to remember A password can be composed of a sentence you can remember Delay response to an incorrect password Lock out after X tries Provides an opportunity for Denial of Service Store the passwords in encrypted form Do not allow access to the password file Replay Threats Someone may be able to copy the data you send to a server to log in. Even if they cannot decrypt the data, they might be able to send it to the server themselves to log in. This can be prevented by using different encryption keys for each login session or by using secure authentication protocols. 11 Secure Authentication If the server and the client share an encryption key Client Send ID & nounce1 Server Send encrypted nounce1& nounce2 Send encrypted nounce2 Send OK COMP620 3

Augmenting password logins What You Have Some sites display a personalized phrase when you are asked kdto enter your password If you do not see the correct phrase, you should not enter your password. The sites IP address can be used as part of the user authentication Users can be required to have a device to identify them ID card smartcard USB with security file Should be used in conjunction with other authentication methods Where You Are Some operating systems grant access only if you log on from a certain terminal. Typically the IP address of the computer is used Global Positioning System (GPS) might be used to established the precise geographical location of a user during authentication What You Are Biometrics COMP620 4

What You Can Do Fingerprints People perform mechanical tasks in a way that isboth repeatable and specific to the individual. Users could sign on a special pad that measures attributes like writing speed and writing pressure. On a keyboard, typing speed and key strokes intervals can be used to authenticate individual users. Fingerprint readers are simple and inexpensivei For most people they have high reliability Not every person has usable fingerprints 17 Iris Matching Every person s iris is said to be unique You have to get a close image Better for authentication than recognition Revoking Biometrics You can easily change your password if someone learns what htit is. How do you change your fingerprint (or other biometric) if someone gets a copy? What if the biometric is unavailable? 20 COMP620 5

Captcha Captcha Requirements "Completely Automated Public Turing test to tllc tell Computers t and Humans Apart." t" A type of challenge response test used to ensure that the response is not generated by a computer Sometimesdescribed as a reverse Turing test The purpose is to keep automated systems from accessing systems designed for humans Current software is unable to solve accurately Most humans can solve Does not rely on the type of CAPTCHA being new to the attacker. Captcha Accessibility People with visual impairment may not be able to read a captcha th Alternatives need to be available Audio captchas have been used Common sense" questions such as "what color is the sky on a clear day? Image recognition CAPTCHAs Difficult to automatically generate Captcha Circumvention Optical character recognition Human solvers Human hacker is asked to solve captchas when a program cannot Enticed users to solve captchas on a high traffic website owned by an attacker Circumvention of captchas may violate the anti circumvention clause of the Digital Millennium Copyright Act COMP620 6