DOC PREVIEW
USC CSCI 530 - authentication_fa06

This preview shows page 1-2-3 out of 9 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 9 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CSCI 530 LabAuthenticationSlide 3How much authentication is needed?How can authentication be broken?Password BreakingSlide 7Detecting someone trying to break into a systemThis week’s labCSCI 530 LabAuthenticationAuthenticationAuthentication is verifying the identity of a particular personExample: Logging into a systemExample: PGP – Digital Signature is the authentication mechanismDifferent from AuthorizationAuthorization states what he/she can do on a systemAuthenticationHow do we authenticate:Something they knowPasswordSomething they areRetinaFingerprintDNASomething they ownSmart CardSomewhere they areLogin only works at certain terminalsHow much authentication is needed?We can use either one or a combination of all the aboveClient systemsNormally just a loginMilitary top secret security baseNameBadgePasscodeCredit card purchasesDriver’s licenseNamePictureHow can authentication be broken?For security purposes, we need to know how authentication can be broken so we know how to prevent against itPasswordsCan be GuessedCan be CrackedSmartcardsCan be copied or stolenFingerprintsCan be copied by using scotch tapePassword BreakingDictionary attackList of dictionary words that are tried one after anotherVery quickIf the password is not an exact match to a word on the list, then it will failHybrid attackUses a dictionary list but can detect slight variations to words, or combinations of words.Example: if the word hello is in the database, but the password is Hello, a dictionary attack will not break the password, but a Hybrid attack willGenerally finds many more words than a Dictionary attackNot as quick as Dictionary attackPassword BreakingBruteforce attackWill try every character combination until it finds the passwordEXTREMELY SLOWWill always find the passwordThese techniques can either be used against a system or a file containing the passwordsDetecting someone trying to break into a systemAuto-logoutIf the user enters the wrong password n times, disable their account for a certain period of timeProtect your password list on your systemMake sure the administrator has access and no one else, so a normal user cannot copy it onto another systemThis week’s labUsing a Virtual Linux systemLogin as root, create user names, then copy the password file to the Windows host systemUse John the Ripper to break the passwords in the password fileMust be done in lab since we are using a Linux virtual


View Full Document

USC CSCI 530 - authentication_fa06

Download authentication_fa06
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view authentication_fa06 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view authentication_fa06 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?