authentication+and+access+control
authentication+and+access+control
1PPN0143
NJA
Managing Password
• All time we try not to disclose password at any level.
• There are number of tools to crack password.
• Send password through courier with personal delivery.
(Banks normally use it)
• Send Password through information given in the form like
email or Mobile number, use that password for one time
only.
• Ask user to change that password in first login only.
• Confirmation should send through mail or activate
account through particular link only.
• Do not relay only on password also use some key, this key
will be generated through device or generate online and
send through mail or mobile number.
• Do not use vehicle no, computer name,spell backwords like
drowssap etc
2PPN0143
NJA
Choosing a password
• Do not choose password base upon personal data.
• Do not choose password that is English dictionary
word, TV show, keyboard sequence.
• Do not choose password that is append special
character. Like pasword123, password!, password* etc..
• Do not choose password less then 8 characters.
• Do not only use characters, numbers.
• Avoid guessable words, or easily traceable.
• Do not choose Default Passwords
• Do not use password as name of spouse, child
,surname, friends name etc
• Do not give same password to all account.
3PPN0143
NJA
5PPN0143
NJA
6PPN0143
NJA
7PPN0143
NJA
8PPN0143
NJA
User Education
Tell computer users importance of hard-to
guess password.
Give password selection guidelines.
Do not tell your password to unknown person.
Computer Generated Password
Computer generated password also have some problem
, it is reasonable random in nature but very difficult to
remember like : gTs!P5w2q.
Many time users write it down.
Automated password generators use random
characters and numbers generator.
Many system generator passwords is used for one
time only or at first login we have to change it.
9PPN0143
NJA
10PPN0143
NJA
11PPN0143
NJA
Piggybacking
• Piggybacking is the simply access of a wireless
connection closely behind a person who just used there
own access card on PIN to gain physical access to a
room or building, without knowing to subscriber
• They get access to facility to without knowing
to authorized persons.
• In short, access of wireless internet connection by
bringing one’s computer within range of another
wireless connection without permission.
Reasons for piggy backing:
• Avoid paying required access fees.
• Gain access to area which is completely restricted .
• To hide identification.
• Person forgotten or loss it’s access key.
12PPN0143
NJA
Shoulder Surfing
• In shoulder surfing refer to use direct observation
technique. looking overs some one ‘s shoulder to get
information.
• This method is effective in crowded places because it
is relatively easy to observe some one’s activity like:
– Entering password or PIN number in the computer.
– Fill out form
– Entering access code in ATM or public places.
– Shoulder surfing can be done at a distance using vision
enhancing devices.
• To avoid shoulder surfing it is advice to
hide keypad by using body.
• Do not use computer in crowded places like
cyber café ,libraries or places where people are
very close to you.
13PPN0143
NJA
Dumpster Diving
• Dumpster Diving is method by which attacker search for
important system information by diving into the dump.
The search is carried out in paper waste, electronic waste
such as old HDD, floppy and CD media recycle and trash
bins on the systems etc.
• attackers tries to extracts passwords, system
configuration, network configuration, user lists from
these list from these methods, and gain access to these
important details.
• Dumpster diving is learning
anything valuable from your trash,
• Experts recommended that company should ake
m policy where all paper, including print outs and disposal
impo documents should be erased properly and
recycled.
14PPN0143
NJA
15PPN0143
NJA
16PPN0143
NJA
Access Control
• Access control is the ability to permit or deny use
of particular resource by a particular entity.
• Access control mechanism is minimize
physical resource, logical resources or digital
resources.
• Access control techniques:
– Discretionary Access Control (DAC)
– Mandatory Access Control (MAN)
– Role Base Access Control (RBAC)
17PPN0143
NJA
resources
19PPN0143
NJA
BIOMETRICS
• “Biometric refers study of method for uniquely
recognizing human based upon one of more physical
or behavioral characters.”
•
22PPN0143
NJA
24PPN0143
NJA
Biometric System
Applicatio
n Device
Sensor
25PPN0143
NJA
Fingerprints
• In this fingerprints are matched with the database and
matching is carried out using complex image
processing algorithm, user is authonticated,if matched.
• Fingerprint Recognition or fingerprint
authentication Process.
• Fingerprints are one of many forms of biometric used
to identify and individual and verify there identify.
• Analysis of fingerprints for matching purpose
requires several comparison of features of the print
pattern.
• These patterns include unique features found with
in patterns.
26PPN0143
NJA
27PPN0143
NJA
Applications Of Fingerprints
• Forensic
Criminal investigation.
Terrorist identification
• Government
National ID card (Aadhaar
Card) Driving License
Social Security
• Commercial
• Computer network Cellular Phone
• E-commerce Medical record management
• ATM,Credit Card. Distance Learning
29PPN0143
NJA
Advantage
• High Accuracy
• Most Economical.
• Easy to use
• Small storage space.
• It is standardized
• Fingerprints are much harder to fake than identity cards.
• ·You can't guess a fingerprint pattern like you can guess
a password.
• You can't misplace your fingerprint, like you can
misplace an access card.
• You can't forget your fingerprints like you can forget
a password.
30PPN0143
NJA
Disadvantages
• Using the fingerprint scanner does not take into
consideration when a person physically changes.
• Using the fingerprint scanner can lead to false rejections.
• Some people have damaged fingerprints.
31PPN0143
NJA
Hand Prints
• Hand biometric is base on the geometric shape of the
hand size of palm, length and width of finger,
distance between knuckles etc.
• In hand geometric user can be identify by using
shapes and other dimensions matches with live hand
scan.
• Advantages: Requires special Hardware which is
easily integrated with other devices.
• The amount of data requires to
identify a user in a system is
small.
• Easy to use.
• Hand data easy to collect.
32PPN0143
NJA
33PPN0143
NJA
34PPN0143
NJA
35PPN0143
NJA
36PPN0143
NJA
• Advantages :
• Very high accuracy.
• Extremely low false rate.
• Speedily result.
• Like fingerprint it remain same through life of human.
• So useful for children's also.
• Disadvantages: Measurement accuracy can be
affected by some deices like diabetes, glaucoma etc.
• Not user friendly.
• High equipment cost . Technology difficult to use as
some people discomfort for scanning.
• User commonly fear that the device itself or light
can harm to there eyes.
37PPN0143
NJA
Voice Synthesis
• In this method the voice of user is recorded and it’s digitally
signal analysis is carried out.
• There are Speaker recognition is to recognition WHO is
speaking and
• Speech recognition WHAT is speaking,. Words
• Voice recognition is combination of both speaker and
speech.
• Various technologies are used for
recording voice like frequency
estimation, Gaussian mixture model
etc.
38PPN0143
NJA
42
NJA
44
NJA
Thank You !!
45