IS Module 2
IS Module 2
User authentication
The process of verifying an identity claimed by or for a system entity. An authentication
process consists of two steps
- Identification step–presenting an identifier to the security system.
- Verification step–presenting or generating authentication information that confirms
the binding between the entity and theidentifier.
A typical item of authentication information associated with this user ID is a
password,which is kept secret
Means of Authentication
There are four general means of authenticating a user’s identity, which canbe used alone or
in combination:
• Something the individual knows:Examples includes a password,a personal
identification number (PIN), or answers to a prearranged set of questions.
• Something the individual possesses:Examples include electronic key cards,smart
cards,and physical keys.This type of authenticator is referred to as a token.
• Something the individual is(static biometrics):Examples include recognition by
fingerprint, retina, and face.
• Something the individual does (dynamic biometrics): Examples include recognition by
voice pattern,hand writing characteristics,and typing rhythm.
Password Based Authentication
A widely used system in which the user should provide not only an ID butalso a password.
The system compares the password to a previously stored password for that userID,
maintained in a passwordfile.
The ID provides security in the following gways:
• The ID determines whether the user is authorized to gain access to asystem.
• The ID determines the privileges accorded to the user. A few users may have supervisory
or “superuser” status that enables them to read files andperform functions that are
especially protected by the operating system..
• The ID is used in what is referred to as discretionary access control. For example,by
listing the ID of other users,a user may grant permission to them to read files owned
bythat user.
Hashed passwords
A widely used password security technique is the use of hashed passwords and a salt value.
To load a new password into the system, the user selects or is assigned a
password.This password is combined with a fixed-length salt value.
In older implementation this value is related to the time at which the password is
assigned to the user.Newer implementations use a pseudo random or random
number.
The password and salt serve as inputs to a hashing algorithm to produce a fixed -
length hashcode
The hashed password is then stored, together with a plaintext copy of the salt, in the
password file for the corresponding userID.
The hashed password method has been shown to be secure agains ta variety of
cryptanalytic attacks.
Salt value prevents duplicate passwords from being visible in the password file.Even
if two users choose the same password,those passwords will be assigned different
saltv alues.Hence ,the hashed passwords of the two users will differ.
Password cracking
Traditionalapproaches:-
- Passwordguessing
Password guessing is the process of attempting to gain access to a system through the
systematic guessing of passwords
- Password cracking
• Password cracking
It is the process of using an application program to identify an unknown or forgotten password to a
computer or network resource. It can also be used to help an attacker to obtain unauthorized access to
resources.
-
Modernapproaches
- SQLinjection-SQL injection is a web security vulnerability that allows an attacker to interfere
with the queries that an application makes to its database.
Solutions are
- Complexpasswordpolicy-A password policy is a set of rules designed to enhance computer
security by encouraging users to employ strong passwords and use them properly.
- Processingcapacityincreased
- Sophisticatedalgorithms togeneratepasswords
Instead of accessing the system password file,another approach to collecting user IDs and
passwords is through sniffing network traffic. Thus,a password protection policy must
complement access control measures with techniques to force users to select passwords
that are difficult to guess.
Password Selection Strategies
Fourbasictechniquesareinuse:
• Usereducation
• Computer-generated passwords
• Reactive password checking
Complex password policy
1.User education
Users must be aware about the importance of using hard-to-guess passwords and can be
provided with guidelines for selecting strong passwords.
2.Computer-generated passwords also have problems. If the passwords are quite random
in nature, users will not be able to remember them. Even if the password is
pronounceable,the user may have difficulty remembering it and so be tempted to write it
down
3.reactive password checking strategy is one in which the system periodically runs its own
password cracker to find guessable passwords.The system cancels any passwords that are
guessed and notifies the user.
4.complex password policy, or proactive password checker.
It is an improvedpasswordsecurity checker. In this scheme, a user is allowed to select their
own password. However, at the time of selection, thesystem checks to see if the password is
allowable and, if not,rejects it. By sufficient guidance from thesystem, users can select
memorable passwords .
Token Based Authentication
Objectsthat a user possesses for the purpose of user authentication are called tokens.
1.MemoryCards
Memory cards can store but not process data.The most common such card is the bank card
with a magnetic stripe on the back. A magnetic stripe canstore only a simple security code,
which can be read by an inexpensive card reader.
For authentication, a user provides both the memory card and some form of password or
personal identification number (PIN). A typical application is an automatic teller machine
(ATM).
potentialdrawbacks arethe following
Requires special reader
Token loss
User dissatisfaction
2.SmartCards
• Physicalcharacteristics:Smart tokens include an embedded microprocessor. A smart
token that looks like a bank card is called a smartcard. Other smart tokens can look like
calculators, keys, or other small portable objects.
• Userinterface:Manual interfaces include a keypad and display for human/token
interaction.
• Electronic interface: A smart card or other token requires an electronic interface to
communicate with a compatible reader/writer. A card may haveoneorboth of the
followingtypes ofinterface:
— Contact: A contact smart card must be inserted into a smart cardreader with a
direct connection to a conductive contact plate on the surfaceof the card (typically gold
plated)..
—Contactless: A contactless card requires only close proximity to a reader.Both the
reader and the card have an antenna,and the two communicate using radio frequencies..
• Authentication protocol: The purpose of a smart token is to provide ameans for user
authentication. We can classify the authentication protocolsusedwith smarttokens
intothreecategories:
— Static: With a static protocol, the user authenticates himself or herself to the
token and then the token authenticates the user to the computer. The latter half of this
protocol is similar to the operation of amemorytoken.
— Dynamic password generator:In this case,the token generates a unique
password periodically (e.g., every minute). This password is thenentered into the computer
system for authentication, either manually by the user or electronically via the token.
— Challenge-response: In this case, the computer system generates a challenge,
such as a random string of numbers. The smart token generates a response based on the
challenge. For example, public-key cryptographycould be used and the token could encrypt
the challenge string with thetoken’sprivatekey.
Biometric Authentication
A biometric authentication system attempts to authenticate an individualbased on the
physical characteristics. These include static characteristicslike fingerprints, hand geometry,
facial characteristics, and retinal and iris patterns;and dynamic characteristics like voice
printand signature.
Facial characteristics:Facial characteristics are the most common means of human- to-
human identification,thus it is natural to consider them for identification by computer. The
most common approach is to definecharacteristics based on relative location and shape of
key facial features,such as eyes, eyebrows, nose, lips, and chin shape.
Fingerprints:. A fingerprint is thepattern of ridges and furrows on the surface of the
fingertip. Fingerprints are believed to be unique across the entire human population
Hand geometry: Hand geometry systems identify features of thehand,includingshape,
andlengths andwidthsof fingers.
• Retinal pattern: A retinal biometric system obtains a digital image of the retinal
pattern byprojecting a low-intensity beam of visual or infrared light into the eye.
• Iris:Another unique physical characteristic is the detailed structure of the iris.
• Signature: Each individual has a unique style of handwriting and this is reflected
especially in the signature, which is typically a frequently written sequence.
• Voice: voice patterns are more closely tied to the physical and anatomical
characteristics of the speaker.Nevertheless,there is still a variation from sample to sample
overtime from the same speaker,complicating the biometric recognition task.
Authentication: Verification that the credentials of a user or other system entity are valid.
Audit: An independent review and examination of system records and activities to test for
detect problems in security, and to recommend any changes in control, policy and
procedures.
Access right
Describes the way in which a subject may access an object. Access rights could include
the following:
• Read: User may view information in a system resource (e.g., a file, selected
records in a file, selected fields within a record, or some combination). Read access
includes the ability to copy or print.
• Write: User may add, modify, or delete data in system resource (e.g., files,
records, programs). Write access includes read access.
• Execute: User may execute specified programs.
• Delete: User may delete certain system resources, such as files or records.
• Create: User may create new files, records, or fields.
• Search: User may list the files in a directory or otherwise search the directory.