Identification and Authentication
CSM27 Computer Security Dr Hans Georg Schaathun
University of Surrey
Autumn 2009 – Week 4
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 1 / 32
Identification and Authentication CSM27 Computer Security Dr Hans - - PowerPoint PPT Presentation
Identification and Authentication CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2009 Week 4 Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 Week 4 1 / 32 Introduction Background
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 1 / 32
Introduction Background
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 2 / 32
Introduction Background
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 3 / 32
Introduction Background
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 4 / 32
Introduction Definitions
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 5 / 32
Introduction Definitions
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 6 / 32
Introduction Definitions
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 7 / 32
Introduction Definitions
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 7 / 32
Introduction Definitions
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 7 / 32
Introduction Definitions
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 7 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 8 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 9 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 10 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 10 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 10 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 10 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 10 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 11 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 11 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 11 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 11 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 12 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 12 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 12 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 12 / 32
Introduction Password management
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 12 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 13 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 14 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 14 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 14 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 15 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 15 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 15 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 15 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 15 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 16 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 17 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 17 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 18 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 18 / 32
Attacks Guessing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 18 / 32
Attacks Spoofing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 19 / 32
Attacks Spoofing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 20 / 32
Attacks Spoofing Passwords
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 21 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 22 / 32
Attacks The password file
ii00002:FFT.sa0X6JFtg:138542:13163:Ikpaya Ikpaya:/user/pgt1/ii00002:/usr/local/bin/tcsh php3mm:HoeWG92G08wEU:23705:23300:Mr Michael J Merchant:/user/phradpg/php3mm:/usr/local/bin/tcsh ph41mr:zothpaD8o2gEg:23196:23005:Mr Michael S Rubery:/user/ph43/ph41mr:/usr/local/bin/tcsh gj0006:HIwyd0KZo65Jo:143647:23200:Gareth Jones:/user/phgammast/gj0006:/usr/local/bin/tcsh ees3jm:iin1Yh1VHskP.:13307:13010:Jinming Ma:/user/pgr1/ees3jm:/usr/local/bin/tcsh eep2zl:90hK45skpndt2:13662:13020:Zongyang Luo:/user/ccsrnrpg1/eep2zl:/usr/local/bin/tcsh cs41hi:ALcOsbamD/axA:33299:28154:Mr Hercules Iliopoulos:/user/cs4/cs41hi:/usr/local/bin/tcsh phpc251$:*:70033:979:phpc251$ machine account:/dev/null:/bin/false rj00001:DISABLED2KBPkYbFtgaDk:136711:28156:Richard Jeffery:/user/ug1/rj00001:/sbin/nologin
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 23 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 24 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 24 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 24 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 24 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 25 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 25 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 25 / 32
Attacks The password file
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 25 / 32
Closing Words Alternative Approaches
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 26 / 32
Closing Words Alternative Approaches
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 27 / 32
Closing Words Alternative Approaches
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 28 / 32
Closing Words User convenience
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 29 / 32
Closing Words User convenience
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 30 / 32
Closing Words User convenience
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 30 / 32
Closing Words User convenience
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 30 / 32
Closing Words User convenience
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 30 / 32
Closing Words User convenience
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 30 / 32
Closing Words Exercises
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 31 / 32
Closing Words Exercises
Dr Hans Georg Schaathun Identification and Authentication Autumn 2009 – Week 4 32 / 32