access control process
identification
authentication
authorisation
what is authentication
prove you are who you claim to be by:
knowledge based authentication
passwords
passphrases
password bad practices
password entropy
measure of uncertainty
attacking passwords
password hardening
what are tokens
physical devices to aid authentication
types of biometrics
physical
behavioural
requirements for biometrics
acceptability of biometrics
authentication needs to be accepted by end users
accuracy of biometrics
behavioural
how you type/walk
can change over time
people may have similar behaviours
voice recognition
is both behavioural and physical
biometrics advantages
biometrics disadvantages
authorisation: types of access control
principle of least privilege
best security privilege
limit privileges to minimum necessary to perform task