Authentication

Authentication - Computer Security Protection in general...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
11/07/11 1 Computer Security Protection in general purpose Operating Systems
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 2 Entity Authentication Entity Authentication is the process of verifying a claimed identity It is based on: something the entity knows something the entity holds something the entity is something the entity does where the entity is
Background image of page 2
11/07/11 3 Something the entity knows The user has to know some secret, such as a password or a personal identification number (PIN). Threats Anybody who knows your secret “is you”!
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 4 Something the entity holds The user has to present a physical token (such as key, an identity tag, a card) to be authenticated. Threats The token can be lost or stolen!
Background image of page 4
11/07/11 5 Something the entity is Use biometrics , such as fingerprints , palm prints , iris patterns, or retina patterns . With biometrics a stored pattern is compared to an actual taken measurement. Problems False positives (accepting the wrong entity) and false negatives! Many users find biometrics unacceptable. Gruesome threats of the kind used in some Hollywood thrillers!
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
11/07/11 6 Something the entity does People perform some mechanical tasks in a way that is both repeatable and specific to the individual . Examples hand written signatures on a writing pad the writing speed/pressure of a hand written signature on the keyboard the typing speed and intervals between strokes Problems False positives (accepting the wrong entity) and false negatives!
Background image of page 6
11/07/11 7 Where the entity is The system may take into account the location of the login. For example, access may only be granted from
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 21

Authentication - Computer Security Protection in general...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online