Chapter 9
Chapter 9
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use. 1
Objectives
11.1 Describe the different types of authentication
credentials
11.2 Explain what single sign-on can do
11.3 List the account management procedures for
securing passwords
© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
Authentication Credentials (1 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3
Authentication Credentials (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4
What You Know: Passwords
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 5
Password Weaknesses (1 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 6
Password Weaknesses (2 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7
Password Weaknesses (3 of 3)
Rank Password
1 123456
2 123456789
3 abc123
4 password
5 password1
6 12345678
7 111111
8 1234567
9 12345
10 1234567890
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8
Attacks on Passwords (1 of 9)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 9
Attacks on Passwords (2 of 9)
• Offline attack
• Method used by most password attacks today
• Attackers steal file of password digests
- Compare with their own digests they have created
• Offline password attacks include:
• Brute force
• Mask
• Rule
• Dictionary
• Rainbow tables
• Password collections
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10
Attacks on Passwords (3 of 9)
• Brute force
• Every possible combination of letters, numbers, and characters
used to create encrypted passwords and matched against stolen file
• Slowest, most thorough method
• NTLM (New Technology LAN Manager) hash
- An attacker who can steal the digest of an N TLM password would
not need to try to break it
- He would simply pretend to be the user and send that hash to the
remote system to then be authenticated
- Known as a pass the hash attack
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11
Attacks on Passwords (4 of 9)
• Mask Attack
• A more targeted brute force attack that uses placeholders for
characters in certain positions of the password
• Parameters that can be entered in a mask attack include:
- Password length
- Character set
- Language
- Pattern
- Skips
• Rule Attack
• Conducts a statistical analysis on the stolen passwords that is
used to create a mask to break the largest number of passwords
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12
Attacks on Passwords (5 of 9)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13
Attacks on Passwords (6 of 9)
• Dictionary Attack
• Attacker creates digests of common dictionary words
• Compares against stolen digest file
• Pre-image attack - a dictionary attack that uses a set of dictionary
words and compares it with the stolen digests
• Birthday attack - the search for any two digests that are the same
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 14
Attacks on Passwords (7 of 9)
• Rainbow Tables
• Creates a large pregenerated data set of candidate digests
• Steps for using a rainbow table
• Creating the table
- Chain of plaintext passwords
- Encrypt initial password
- Feed into a function that produces different plaintext passwords
- Repeat for a set number of rounds
• Using the table to crack a password
- Run encrypted password though same procedure used to create
initial table
- Results in initial chain password
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 15
Attacks on Passwords (8 of 9)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 16
Attacks on Passwords (9 of 9)
• Password Collections
• In 2009, an attacker used an SQL injection attack and more than 32
million user passwords (in cleartext) were stolen
• These passwords provided two key elements for password attacks:
- Gave attackers a large corpus of real-world passwords
- Have provided attackers advanced insight into the strategic thinking
of how users create passwords
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17
Password Security (1 of 5)
• Securing passwords from attacks depends upon the user as well as the
enterprise
• For the user
• It involves properly managing passwords
• For the enterprise
• It involves protecting password digests
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 18
Password Security (2 of 5)
• Managing Passwords
• Most critical factor in a strong password is length
• In addition to having long passwords, other recommendations are:
- Do not use passwords that consist of dictionary words or phonetic
words
- Do not repeat characters or use sequences
- Do not use birthdays, family member names, pet names, addresses,
or any personal information
• Also, use non-keyboard characters
- Created by holding down the ALT key while typing a number on the
numeric keypad
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 19
Password Security (3 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 20
Password Security (4 of 5)
• Password managers
• Technology used for securing passwords
• Three basic types of password manager:
- Password generators
- Online vaults
- Password management applications
• Protecting Password Digests
• One method is to use salts
- Consists of a random string that is used in hash algorithms
- Passwords can be protected by adding a random strong to the user’s
cleartext password before it is hashed
- Make dictionary attacks and brute force attacks much slower and limit
the impact of rainbow tables
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 21
Password Security (5 of 5)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22
What You Have: Tokens, Cards, and Cell
Phones
• Multifactor authentication
• When a user is using more than one type of authentication credential
• Example: what a user knows and what a user has could be used
together for authentication
• Single-factor authentication
• Using just one type of authentication
• Most common items used for authentication:
• Tokens, cards, and cell phones
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 23
Tokens (1 of 3)
• Tokens
• Used to create a one-time password (O TP)
- Authentication code that can be used only once or for a limited period of time
• Hardware security token
- Typically a small device with a window display
• Software security token
- Stored on a general-purpose device like a laptop computer or smartphone
• Two types of OTPs
• Time-based one-time password (TOTP)
- Synched with an authentication server
- Code is generated from an algorithm
- Code changes every 30 to 60 seconds
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 24
Tokens (2 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 25
Tokens (3 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26
Cards (1 of 2)
• Smart card contains integrated circuit chip that holds information and can
be either:
• Contact card – a “pad” that allows electronic access to chip contents
• Contactless cards (proximity cards)
• Require no physical access to the card
• Common access card (CAC)
• Issued by US Department of Defense
• Bar code, magnetic strip, and bearer’s picture
• The smart card standard covering all U.S. government employees is the
Personal Identity Verification (PIV) standard
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27
Cards (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 28
Cell Phones
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 29
What You Are: Biometrics
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 30
Standard Biometrics (1 of 4)
• Standard biometrics
• Uses a person’s unique physical characteristics for authentication
• Face, hand, or eye characteristics are used to authenticate
• Specialized Biometric Scanners
• Retinal scanner uses the human retina as a biometric identifier
- Maps the unique patterns of a retina by directing a beam of low-energy
infrared light (IR) into a person’s eye
• Fingerprint scanner types
- Static fingerprint scanner - takes a picture and compares with image on file
- Dynamic fingerprint scanner - uses small slit or opening
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 31
Standard Biometrics (2 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 32
Standard Biometrics (3 of 4)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 33
Standard Biometrics (4 of 4)
• Biometric Disadvantages
• Cost of hardware scanning devices
• Readers have some amount of error
• Reject authorized users
• Accept unauthorized users
• Biometric systems can be “tricked”
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 34
Cognitive Biometrics (1 of 2)
• Cognitive biometrics
• Relates to perception, thought process, and understanding of the user
• Easier for user to remember because it is based on user’s life
experiences
• Difficult for an attacker to imitate
• Picture password
• Introduced by Windows
• Users select a picture to use for which there should be at least 10
“points of interest” that could serve as “landmarks” or places to touch
• Other examples of cognitive biometrics:
• Requires user to identify specific faces
• User selects one of several “memorable events”
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 35
Cognitive Biometrics (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 36
What You Do: Behavioral Biometrics (1 of 2)
• Behavioral biometrics
• Authenticates by normal actions the user performs
• Keystroke dynamics
• Attempts to recognize user’s typing rhythm
• All users type at a different pace
• Provides up to 98 percent accuracy
• Uses two unique typing variables
• Dwell time (time it takes to press and release a key)
• Flight time (time between keystrokes)
• Holds a great amount of potential
• It requires no specialized hardware
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 37
What You Do: Behavioral Biometrics (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 38
Where You Are: Geolocation
• Geolocation
• The identification of the location of a person or object using technology
• Used most often to reject imposters instead of accepting authorized
users
• Can indicate if an attacker is trying to perform a malicious action from a
location different from the normal location of the user
• Many websites will not allow a user to access an account if the
computer is located in a different state
• Some websites may require a second type of authentication
• A code sent as a text message to a cell phone number on file
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 39
Single Sign-on
• Identity management
• Using a single authentication credential shared across multiple
networks
• It is called federated identity management (FIM) when networks are
owned by different organizations
• Single sign-on (SSO) holds promise to reduce burden of usernames
and passwords to just one
• Examples of popular SSOs:
• OAuth, Open ID Connect, and Shibboleth
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 40
Account Management (1 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 41
Account Management (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 42
Chapter Summary (1 of 2)
• Authentication credentials can be classified into five categories: what you know,
what you have, what you are, what you do, and where you are
• Passwords provide a weak degree of protection
• Must rely on human memory
• Most password attacks today use offline attacks
• Attackers steal encrypted password file
• A dictionary attack begins with the attacker creating digests of common dictionary
words, which are compared with those in a stolen password file
• Securing passwords from attacks depends upon the user as well as the
enterprise
• Security experts recommend that technology be used to store and manage
passwords called password managers
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 43
Chapter Summary (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 44