Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.

Similar presentations


Presentation on theme: "Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources."— Presentation transcript:

1 Chapter 6 Authenticating People

2 FIGURE 6.0.F01: Authentication to protect computer resources.

3 FIGURE 6.0.F02: Performing the authentication.

4 TABLE 6.0.T01: Examples of authentication techniques

5 TABLE 6.0.T02: Levels of authentication threats

6 FIGURE 6.0.F03: Basic external attacks on authentication.

7 FIGURE 6.0.F04: Unix developers using a teletype. Reprinted with permission of Alcatel-Lucent USA Inc.

8 FIGURE 6.0.F05: Masking the space for typing a password. Courtesy of Dr. Richard Smith

9 FIGURE 6.0.F06: Procedure diagram of password hashing.

10 FIGURE 6.0.F07: Procedure diagram of a one-way hash function.

11 TABLE 6.0.T03: Modern hash functions and the size of their hash values

12 FIGURE 6.0.F08: Keystroke logger. Photo courtesy of KeyGhost.com

13 FIGURE 6.0.F09: Offline trial-and-error attack on Alice’s password hash.

14 EQUATION 6.0.Eq01

15 EQUATION 6.0.Eq02

16 EQUATION 6.0.Eq03

17 EQUATION 6.0.Eq04

18 TABLE 6.0.T04: Search space for random passwords or passphrases

19 FIGURE 6.0.F10: Decimal dice can produce truly random numbers. Courtesy of Dr. Richard Smith

20 TABLE 6.0.T05: Different degrees of cracking feasibility

21 FIGURE 6.0.F11: Dictionary attack by the Morris Worm.

22 EQUATION 6.0.Eq05

23 EQUATION 6.0.Eq06

24 FIGURE 6.0.F12: A four-digit luggage lock. Courtesy of Dr. Richard Smith

25 EQUATION 6.0.Eq07

26 EQUATION 6.0.Eq08

27 FIGURE 6.0.F13: Passive authentication tokens, front and back. Courtesy of Dr. Richard Smith

28 FIGURE 6.0.F14: A hand-operated challenge-response token. Courtesy of Dr. Richard Smith

29 FIGURE 6.0.F15: Using a challenge-response token.

30 FIGURE 6.0.F16: A challenge-response calculation. Courtesy of Dr. Richard Smith

31 FIGURE 6.0.F17: USB direct connect challenge response tokens. Courtesy of Dr. Richard Smith

32 FIGURE 6.0.F18: One-time password token. Courtesy of Dr. Richard Smith

33 FIGURE 6.0.F19: Generating a one-time password. Courtesy of Dr. Richard Smith

34 FIGURE 6.0.T06: Vulnerabilities of authentication tokens

35 TABLE 6.0.F20: Biometric fingerprint reader on a laptop’s keyboard. Courtesy of Dr. Richard Smith

36 FIGURE 6.0.F21: Elements of a biometric system.

37 EQUATION 6.0.Eq09

38 TABLE 6.0.T07: Household policy for a weak threat environment

39 TABLE 6.0.T08: Policy for a workplace using passwords against weak threats

40 TABLE 6.0.T09: Policy for a workplace using tokens and passwords against weak threats

41 TABLE 6.0.T10: Extending the password policy from Table 6.8 for strong threats

42 TABLE 6.0.T11: Policy from Table 6.8 extended to apply biometrics to strong threats

43 TABLE 6.0.T12: Extending the token policy from Table 6.9 for strong threats


Download ppt "Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources."

Similar presentations


Ads by Google