UNIT 4 Identification and Authentication
UNIT 4 Identification and Authentication
This authentication method does mean that, if an IdP suffers a data breach,
attackers could gain access to multiple accounts with a single set of
credentials. SSO also requires an initial heavy time investment for IT to set
up and connect to its various applications and websites
2.Bootstrapping password protection
Bootstrapping password protection in a distributed system involves
establishing a secure and trusted environment where users can
authenticate themselves and access resources securely. Here's a detailed
explanation with a real-time example:
Key Concepts:
1. Initial Setup:
o Define a central authority (e.g., a Key Distribution Center)
responsible for managing user credentials and issuing
authentication tokens.
o Distribute initial credentials securely to all nodes in the system.
2. User Authentication:
o Implement a secure login mechanism where users provide
their credentials (e.g., username and password).
o Use cryptographic techniques (e.g., hashing and salting) to
store and verify passwords securely.
3. Token Issuance:
o Upon successful authentication, issue a secure token (e.g., a
session token or ticket) that the user can use for subsequent
access.
o Ensure the token is encrypted and has a limited validity period.
4. Secure Communication:
o Use protocols like SSL/TLS to encrypt communication between
nodes and clients.
o Implement mutual authentication to ensure both parties are
verified.
5. Access Control:
oDefine access control policies to determine which resources
users can access based on their roles and permissions.
o Use role-based access control (RBAC) or attribute-based access
control (ABAC) for fine-grained access management.
6. Periodic Re-authentication:
o Implement periodic re-authentication to ensure ongoing
security.
o Require users to re-enter their credentials or refresh their
tokens at regular intervals.
Scenario:
Imagine a distributed system with multiple nodes (servers) and users who
need to access resources on these servers securely.
Steps:
1. Initial Setup:
o Establish a Key Distribution Center (KDC) that will manage
user credentials and issue authentication tokens.
o Distribute initial credentials (e.g., public keys) securely to all
nodes in the system.
2. User Authentication:
o Implement a secure login mechanism where users provide
their username and password.
o Store passwords securely using hashing and salting techniques.
3. Token Issuance:
o Upon successful authentication, the KDC issues a session token
encrypted with the user's public key.
o The token includes a session key for secure communication and
has a limited validity period.
4. Secure Communication:
o Use SSL/TLS to encrypt communication between nodes and
clients.
o Implement mutual authentication to ensure both parties are
verified.
5. Access Control:
o Define access control policies based on user roles and
permissions.
o Use RBAC or ABAC for fine-grained access management.
6. Periodic Re-authentication:
o Require users to re-enter their credentials or refresh their
tokens at regular intervals to ensure ongoing security.
3.Guessing passwords
Guessing passwords, often referred to as password cracking, is the process
of attempting to gain unauthorized access to a system by systematically
entering different password combinations. This can be done through
various methods, such as brute force attacks, dictionary attacks, and social
engineering. Here's a detailed explanation with real-time examples:
2. **Dictionary Attack**:
4. **Phishing**:
5. **Shoulder Surfing**:
1. **Phishing**:
2. **Spear Phishing**:
5. **Baiting**:
6. **Tailgating/Piggybacking**:
- **Impact**: Employees who fall for the scam may reveal their login
credentials, allowing attackers to access the institution's distributed
network and steal sensitive financial data.
2. **Spear Phishing Targeting Executives**:
- **Impact**: Employees who plug the USB drives into their computers
may inadvertently install malware, which spreads across the distributed
system, compromising security and data integrity.
Countermeasures:
1. **IP Spoofing**:
2. **Email Spoofing**:
- **Description**: Attackers send emails that appear to come from a
legitimate source to trick recipients into divulging sensitive information
or clicking on malicious links.
3. **Website Spoofing**:
4. **ARP Spoofing**:
5. **DNS Spoofing**:
### Countermeasures:
2. **Email Security**:
3. **Secure Communication**:
4. **Access Control**:
- Use role-based access control (RBAC) to ensure users only have access
to the data they need.
6. **Employee Training**:
- Educate employees about the dangers of spoofing attacks and how to
recognize them.
2. **Credential Stuffing**:
3. **Phishing**:
- **Description**: Attackers trick users into revealing their passwords
through fake login pages or emails.
5. **Keylogging**:
6. **Shoulder Surfing**:
### Countermeasures:
1. **Credential Theft**:
3. **Keylogging**:
5. **Social Engineering**:
### Countermeasures:
1. **Use Strong Hashing Algorithms**: Store passwords using strong,
salted hashing algorithms to make cracking more difficult.
1. Encryption
When users create or update their passwords, the platform hashes the
passwords using bcrypt before storing them in the database. Bcrypt is
chosen because it includes a salt and is computationally intensive, making
it resistant to brute-force attacks.
3. Access Control
4. Regular Audits
Example in Action
1. Overview
2. Components Involved
3. SSO Process
4. Real-Time Example
Google Workspace: When a user logs into Gmail, they are automatically
authenticated for other Google services like Google Drive, Google Calendar,
and YouTube. Here’s how it works:
1. User Login: The user logs into Gmail using their Google credentials.
2. SSO Token: Google’s IdP authenticates the user and generates an SSO
token.
3. Access to Other Services: When the user navigates to Google Drive,
the SSO token is used to authenticate the user without requiring
them to log in again.
4. Seamless Experience: The user can access multiple Google services
seamlessly with a single login.
5. Benefits