12 Authentication

12 Authentication - Authentication&Encryption ConceptsText...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Concepts Text Chapter 9 – Information  Security Management Sections Q1, Q3-Q6 Skip Sections Q2 & Q7
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Today’s Objectives Know how to select a good password. Know the importance of backups and how to  make good backups. Understand what encryption is and how it  works. Know what a digital certificate is and how it  protects you.
Background image of page 2
What is Authentication? Process to verify that information comes from  trusted source Passwords Pass Cards Biometrics
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
What Passwords  Should I Avoid? identical characters alphabetic or numeric series characters adjacent on keyboard anything obvious about you any word in the dictionary 
Background image of page 4
How Are Passwords Stolen? Steal encrypted passwords Guess password Brute Force Dictionary Cracks Hybrid Cracks Encrypt guess Compare encrypted guess to stolen encrypted  password until match its found
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cracking Metrics 1 GHz Pentium Processor 1,000 to encrypt guessed password and  compare to target 1 million crack-n-compares per second
Background image of page 6
Brute Force Cracks Max Avg 4 lower (26^4) .457 sec .25 sec 6 lower (26^6) 5.15 min 2.57 min 8 lower (26^8) 58 hrs 29 hrs 309 days 317 yrs 158.5 yr
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Max Avg English Lang
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/21/2011 for the course ACIS 1504 taught by Professor Jmlacoste during the Fall '07 term at Virginia Tech.

Page1 / 30

12 Authentication - Authentication&Encryption ConceptsText...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online