what is authentication?
what is authorization?
does this person have permission to access?
false negative
negative outcome was generated falsely
goal of authentication?
3 authentication methods
password method threat
Trusted path
problems with storing passwords on a file?
solution to storing password info
threats of one-way hash function
is password random
no
how to reduce work for brute force attack?
- rainbow table lookup
what if 2 users use the same password? How to distinguish their hash values?
- store the salt in the same hash value file
touch screen password bias
problem with password
problem with tokens
biometrics
problem with biometrics
is ATM multi-factor?
yes, card and pin