Access Control



tải về 2.19 Mb.
trang5/15
Chuyển đổi dữ liệu01.03.2024
Kích2.19 Mb.
#56689
1   2   3   4   5   6   7   8   9   ...   15
Lecture 04 Access control new (1)

Passwords

  • The bottom line…
  • Password attacks are too easy
    • Often, one weak password will break security
    • Users choose bad passwords
    • Social engineering attacks, etc.
  • Trudy has (almost) all of the advantages
  • All of the math favors bad guys
  • Passwords are a BIG security problem
    • And will continue to be a problem

Password Cracking Tools

  • Popular password cracking tools
    • Password Crackers
    • Password Portal
    • L0phtCrack and LC4 (Windows)
    • John the Ripper (Unix)
  • Admins should use these tools to test for weak passwords since attackers will
  • Good articles on password cracking
    • Passwords - Conerstone of Computer Security
    • Passwords revealed by sweet deal

Biometrics

Something You Are

  • Biometric
    • “You are your key”  Schneier

Are
Know
Have
  • Examples
    • Fingerprint
    • Handwritten signature
    • Facial recognition
    • Speech recognition
    • Gait (walking) recognition
    • “Digital doggie” (odor recognition)
    • Many more!

Why Biometrics?

  • May be better than passwords
  • But, cheap and reliable biometrics needed
    • Today, an active area of research
  • Biometrics are used in security today
  • But biometrics not really that popular
    • Has not lived up to its promise/hype (yet?)

Ideal Biometric

  • Universal  applies to (almost) everyone
  • Distinguishing  distinguish with certainty
    • In reality, cannot hope for 100% certainty
  • Permanent  physical characteristic being measured never changes
  • Collectable  easy to collect required data
    • Depends on whether subjects are cooperative
  • Also, safe, user-friendly, and ???

tải về 2.19 Mb.

Chia sẻ với bạn bè của bạn:
1   2   3   4   5   6   7   8   9   ...   15




Cơ sở dữ liệu được bảo vệ bởi bản quyền ©hocday.com 2024
được sử dụng cho việc quản lý

    Quê hương