Topic 7NSC
Topic 7NSC
Authentication Overview
Verification: supplying data that connects the object and the identification.
The process through which a user claims their identity is known as identification.
2 passwords
The relevant database table is searched by the system for the username.
Password strength
A stronger password may be written down by many users, which provides a bigger security risk than a
weak password.
Sessions can be taken over by an attacker who disconnects the target while staying online.
Losing Passwords
Hashing works on the principle that it would be very hard to crack a hashed password through trial and
error.
To maintain a high level of security, strong passwords are still necessary for the hashing function.
Multi-Factor Authentication
Disadvantage
Cost
Inconvenience
The sensitivity of the data and transactions that are protected must be balanced with the cost and
inconvenience of security.
Increased Security-Probability
The likelihood that the right verification information will be generated at random is significantly reduced
when two or more verification techniques are combined.
Voiceprint
PIN
Combined
The user gets authenticated if their biometric data matches the template that has been stored.
When a user first registers in the system, several measures are made.
Fingerprints
Fingertip ridges and valleys are specific to each individual fingertip.
- Long-used by police
Face Recognition
Speech Recognition
• Location
• Peers
• Language
Iris Recognition
Hand Geometry
Written Signatures
Uses measurement of the way the signature is written not just the final signature
• Speed
• Pressure
• Angle of writing
possesses a false accept rate (FAR), which measures how quickly the system accepts an invalid user.
possesses a false rejection rate (FRR), which measures the frequency at which the system rejects an
authorized user.
Many laptops and computer accessories have fingerprint readers integrated into them.