Chapter 4: 1
Computer Security 3e
Dieter Gollmann
Security.di.unimi.it/1314/
Computer Security 3e Dieter Gollmann Chapter 4: 1 - - PowerPoint PPT Presentation
Computer Security 3e Dieter Gollmann Chapter 4: 1 Security.di.unimi.it/1314/ Chapter 4: Identification & Authentication Chapter 4: 2 Agenda User authentication Identification & authentication Passwords how to get the
Chapter 4: 1
Security.di.unimi.it/1314/
Chapter 4: 2
Chapter 4: 3
Chapter 4: 4
events in an audit trail.
Chapter 4: 5
Chapter 4: 6
account might be stolen or an impersonator may phone in asking for another user’s password.
Chapter 4: 7
Chapter 4: 8
mother’s maiden name, phone number, name of pet, …
Chapter 4: 9
Chapter 4: 10
Chapter 4: 11
if left unchanged, it is easy for an attacker to break in.
numerical and other non-alphabetical symbols.
Chapter 4: 12
Chapter 4: 13
changes.
posted on computer terminals.
Chapter 4: 14
times.
Chapter 4: 15
Chapter 4: 16
Chapter 4: 17
and the spoofing program terminates.
the user with a genuine login request.
Chapter 4: 18
Chapter 4: 19
using, tell you about an upgrade of the security procedures, and ask you to enter your username and password at the new security site that will offer stronger protection.
Chapter 4: 20
possibly with further measures to slow down dictionary attacks.
Chapter 4: 21
Chapter 4: 22
different entries in the file of encrypted passwords.
Chapter 4: 23
users simply by changing their password, even if it is protected by cryptographic means.
Unix thus store encrypted passwords in a shadow password file that is not publicly accessible.
Chapter 4: 24
files.
shadow password files achieve the desired separation.
Chapter 4: 25
Chapter 4: 26
new security concerns.
Chapter 4: 27
Chapter 4: 28
Chapter 4: 29
Chapter 4: 30
Chapter 4: 31
Chapter 4: 32
core, delta, loops, whorls, …
Chapter 4: 33
database of n persons.
for a given user.
Chapter 4: 34
Chapter 4: 35
matches genuine attempted
number matches genuine rejected
number
Chapter 4: 36
Chapter 4: 37
Chapter 4: 38
a sample.
feature from a sample.
Chapter 4: 39
http://www.onin.com/fp/problemidents.html
Chapter 4: 40
security personnel.
have to be taken to counteract this type of fraud.
Chapter 4: 41
Chapter 4: 42
console but not from an arbitrary user terminal.
their office.
Chapter 4: 43