identity and authentication
play

IDENTITY AND AUTHENTICATION Chad Spensky Allthenticate WHO AM I? - PowerPoint PPT Presentation

IDENTITY AND AUTHENTICATION Chad Spensky Allthenticate WHO AM I? WHO AM I? Chad Spensky (Professional) Ph.D. Student Computer Security Researcher Founder of Allthenticate WHO AM I? Chad Spensky (Social) Beach Volleyball


  1. IDENTITY AND AUTHENTICATION Chad Spensky Allthenticate

  2. WHO AM I?

  3. WHO AM I? • Chad Spensky (Professional) • Ph.D. Student • Computer Security Researcher • Founder of Allthenticate

  4. WHO AM I? • Chad Spensky (Social) • Beach Volleyball Player • Country Music Enthusiast • Fried Chicken Connoisseur

  5. WHO AM I? • Shortman (Online) • Hacker • CTF Player • You?

  6. THE PROBLEM I should have access to some things, and not others

  7. THE PROBLEM My Bank Account Your Bank Account

  8. THE PROBLEM My E-mail Your E-mail

  9. THE PROBLEM Your House

  10. AUTHENTICATION Convincing a digital entity that I am me

  11. AUTHENTICATION Convincing a digital entity that I am me authorized

  12. AUTHENTICATION Only permitting authorized users to access a resource Chad

  13. AUTHENTICATION Real World Digital World

  14. AUTHENTICATION • What you know • What you have • What you are

  15. WHAT YOU KNOW A Secret Personal Details *******

  16. WHAT YOU HAVE

  17. WHAT YOU ARE

  18. THE GOOD • Know : Always with you • Have : No mental burden • Are : Just be yourself

  19. THE BAD • Know : You must remember it. always. • Have : You must always have it. • Are : What if you temporarily change? (e.g., cold or injury)

  20. THE UGLY • Know : You must be better than a computer. • Have : What if it gets stolen? • Are : You can never share or revoke who you are.

  21. PASSWORDS ******* ******* ******* 1990s

  22. PASSWORDS chad1 ******* ******* 1990s

  23. PASSWORDS chad1 chad86 ******* 1990s

  24. PASSWORDS chad1 chad86 NotChad! 1990s

  25. PASSWORDS • Attackers were blinding guessing or cracking offline credentials • Stronger passwords are harder to guess/crack 1990s

  26. PASSWORDS More than 15 usernames More than 150 saved passwords cspensky@ucsb.edu ******* 3 dedicate apps ******* ******* ******* cspensky@gmail.com ******* ******* ******* ******* ******* cspensky@mit.edu ******* ******* ******* ******* ******* ******* ******* ******* chad@allthenticate.net ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* cspensky@cs.ucsb.edu ******* ******* ******* ******* ******* ******* ******* chad@cspensky.info ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* cspensky@unc.edu ******* ******* ******* ******* ******* ******* ******* ******* cspensky@alumni.pitt.edu ******* ******* ******* ******* ******* ******* ******* ******* ******* ******* chad.spensky@ll.mit.edu ******* ******* ******* ******* ******* ******* cspensky@comcast.net ******* ******* ******* ******* ******* cspensky@alumni.unc.edu ******* ******* Today

  27. PASSWORDS • Attackers are phishing users to steal the credential outright • Password strength is completely irrelevant Today

  28. HARDWARE TOKENS Second Factor Hardware Credential Portable Computer Employee

  29. HARDWARE TOKENS • Attackers can still phish second factors • Most hardware credentials can be outright stolen

  30. BIOMETRICS Fingerprint Voice Recognition FaceID

  31. BIOMETRICS Fingerprint Voice Recognition FaceID

  32. BIOMETRICS • Easily accessible (e.g., pictures, recordings, or fingerprints) • Once replicated, are gone forever

  33. FINDING THE RIGHT FIT Value of Asset Security Requirements

  34. FINDING THE RIGHT FIT User Burden Security

  35. FINDING THE RIGHT FIT ******* User Burden Security

  36. FINDING THE RIGHT FIT Implementation Cost Security

  37. FINDING THE RIGHT FIT Implementation Cost ******* Security

  38. THE PROBLEM There are too many options

  39. MORE IS NOT BETTER More bugs More user burden More overhead

  40. WE NEED FLEXIBILITY

  41. WE NEED FLEXIBILITY *******

  42. MORE SECURITY. LESS BURDEN. chad@allthenticate.net www.allthenticate.net

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend