The authentication process consists of two broad steps:
Identification Step
Verification Step
Means of Authentication
What is password authentication and What does an ID determine?
The user ID determines:
Password vulnerabilities
What is Countermeasures?
Controls and prevents unauthorised access
Policies against passwords on network devices
Password Implementation schemes
UNIX Implementation
Improved Implementation
What is Password cracking?
Dictionary attacks
Rainbow table attacks
What is Password File Access Control?
Vulnerabilities of passwords
Password Selection Techniques
User education
Computer generated passwords
Reactive password checking
Proactive password checking
Proactive Password Checking is?
Rule Enforcement
Password cracker
Bloom Filter
Token authentication for: Memory Card and Smart Cards
Memory Cards
Uses black magnetic black strip card
Can be used alone or physical access
Provides greater security
Drawbacks: Loss of token, special reader
Smart Cards
Biometric Authentication (Examples)
Authenticating a user using unique physical characteristics
Includes:
Remote User authentication, name for the 4 four protocols
Authentication Over a network/internet/communications link is more complex
Additional security threats:
What are the Access Control Policies?
Access control requirements
Reliable Control Basic Elements
Object: resource to which access is controlled
Access rights: Describes the way in which a subject may access object
UNIX File Access Control
Contains:
ALL PART OF THE FILE’S INODES
Active inode is associated with exactly ONE FILE
Protection Domains
Set of objects together with access rights to those objects
Discretionary Access Control (DAC)
Controls access based on identity
What are the threee Access Controls?
1 . Discretionary Access Control (DAC)
Controls access based on identity
Controls access based on Roles
Constraints of RBAC
1. Mutually Exclusive Roles
User can only be assigned to ONE ROLE in the set
2. Cardinality
Setting a maximum number with respect to roles
3. Prerequisite roles
Dictates that a user can only be assigned to a particular role if already assigned to some other specified role