Authentication
Authentication
Lesson Introduction
We now have personal devices that are not shared across multiple
users. What threats motivate the use of authentication in such
devices?
● Something a
● Something a user has
● Something a
user knows user is
How is Authentication Implemented?
Login Attacks Quiz
Check the correct answer from the choices.
False positive
True positive
Implementation Quiz
Check the correct answer from the choices.
123456 696969
password 123123
letmein batman
abc123 qwerty
111111 123456789
Implementing Password Authentication
How do we check the password supplied with a user id?
1,000
100,000
10,000
1,000,000
Brute Force Quiz
A randomly chosen password has six characters that include
upper and lower case letters, digits (0-9) and 10 special
characters (examples are +, ; etc.). In the worst case, how
many attempts must a brute-force method make to
determine a password when its hashed value is available?
There is bias in starting at a point near the top left of the screen
Sys Administrators:
●Never store passwords in the clear
●Store only hashed values generated with a random
salt and limit access to them
●Avoid general purpose fast hash functions
Users:
●Use password managers
Other Authentication Methods
Something you have:
True
False
Biometric Authentication Quiz
Biometric authentication based on fingerprints can be hacked if an
attacker can gain access to a user’s fingerprint.
For example, it has been demonstrated that the Apple’s Touch ID can be
fooled with lifted fingerprints. See the link below.
https://techcrunch.com/2013/09/22/hackers-bypass-apples-touch-id-
with-lifted-fingerprint/