User Authentication Simple Definition
The process of verifying an identity claimed by or for a system entity
NIST Definition of User Authentication
The Process of establishing confidence in user identities presented electronically to an information system
What is User Authentication considered?
Role in Security System
Two steps in the authentication process
Is FaceID identifier or verifier?
Verifier because it validates identity by comparing face to stored facial data.
Identifier is implicit!
4 means of authenticating user identity and issues with each
Something the individual: _____
What is password-based authentication?
Method where a user provides a name/(loginID) and a password, which the system compares with a stored password for that login
userID
1. Authorized to enter system?
2. Which privileges?
3. Access control
Password Vulnerabilities (8)
Eric, Please Offer Spectacular Passwords When Making Users
Popular Password Attack
Password Vulnerabilities
Attacker gains unauthorized access by guessing popular passwords
make policies against selection of commonly used passwords (prevent), scan ip address of authentication requests (detect)
Password Guessing (against single user)
Password Vulnerabilities
Guessing against a specific user
min length, character set, training
Electronic monitoring
Password Vulnerabilities
Malware that records every keystroke a user types
Offline dictionary attack
Password Vulnerabilities
Attacker obtains database of hashed passwords and compares them against hash values of commonly used passwords
Access contols (prevent) intrustion detection (detect) rapid reissuance of passwords (respond)
Specific Account Attacks
Password Vulnerabilities
Gathering personal information about a user to guess password
Accout lockout mechanisms
Example of workstation hijacking
Password Vulnerabilities
Attacker accesses a logged-in workstation that was left unattended
Example of Exploiting user mistakes
Password Vulnerabilities
User leaves password on a sticky note on desk
Example of multiple passwords use
Password Vulnerabilities
Attacker gains access to one account and reuses the credentials to access the user’s email or banking accouts
salting helps prevent this!
Online vs. Offline password attacks
Online: Requires interaction with a service or resource
Offline: Works with intercepted or stolen data (password files)
Countermeasures (8)
Password Countermeasures
Account Lockout Mechanisms
Password Countermeasures
The account is locked after a given number of failed attempts
*Has a downside: Can be abused for denial of service attack
Why are passwords the most common authentication technique despite all the vulnerabilities?
Why should passwords NEVER be stored “in clear” ?
Password Countermeasures
BTW: Never email password!!
What are hashed and salted passwords?
Password Countermeasures
Passwords are transformed using a hash function
with a salt value, or random value added to each password before hashing to make attacks harder
Salt values are stored in the password value in clear
How is password verified with salting and hashing?
Password Countermeasures
Why is salting important in password storage? (2)
Password Countermeasures
(salt of b bits increases number of possible passwords by a factor of 2^b)
Salt ensures that each password has a unique hash