Free Essay

Password Security

In:

Submitted By crstlblues
Words 2777
Pages 12
[pic]

Password Security

And Other Effective Authentication Methods

[pic]

Table of Contents
Introduction 1

User Accounts 1

Account and Password Policy 2

Password Attacks 4

Authentication Methods and Password Management 5

Public Key Infrastructure 6

Single Sign-On (SSO) 6

One-Time Password (OTP) Tokens 7

Biometrics 7

Fingerprints 7

Face Scans 7

Retina Scans 7

Iris Scans 7

Palm Scans 8

Hand Geometry 8

Heart Patterns 8

Voice Pattern Recognition 8

Signature Dynamics 8

Keystroke Patterns 8

Password Managers 8

Conclusion 9

Bibliography 10

Introduction

Human beings are arguably the weakest link in computer and information security. People pose such a significant threat to their own computer networks and personal information simply because they don’t keep password security in the forefront of their mind. This is one of the reasons passwords are considered a poor security mechanism. Still, passwords are the most common method for user authentication on computer systems and websites. Passwords are so easily hacked and used to steal personal information such as bank account credentials, credit card numbers, etcetera, contributing to the significant growth of identity theft, most of which could be prevented by using strong passwords and not writing them down. End user education on more secure authentication methods such as strong password creations and two factor authentication can help to improve cyber security for all organizations.

User Accounts

One of the key tasks to administering a network is managing user accounts. User accounts have two main functions according to the Guide to Networking Essentials: 1. To provide a way for end users to authenticate to a network, and 2. To provide detailed information about the user on the network (Tomsho).
User accounts allow network administrators to control who has access to network resources by creating a username and password. End users log into the network and access network resources using the assigned username and password. If an end user attempts to access network resources with the incorrect username and password, they typically receive an access denied error message. Secure networks that use this method will typically lock an account after a specified number of unsuccessful log in attempts, usually three (3). This keeps the network resources secure from unauthorized users.

Account and Password Policy

Network administrators for large networks should develop a naming scheme for user accounts. This ensures that usernames use the same naming convention to keep things consistent. Many organizations use a combination of the user’s initials and part of their name. Other organizations use a combination of letters and numbers. Either way, the naming convention should be the same for all end users. Consideration should be made for whether or not a minimum and maximum number of characters in account names should be enforced. Network administrators should also determine how cryptic the username needs to be in order to maintain security. This will help determine if a combination of uppercase, lowercase, and special characters should be used.
Passwords should have the same considerations as the user name. However, they should be even more secure. To promote a secure network, according to Gregory Tomsho, administrators should set up a password policy that restricts or dictates certain password characteristics (Tomsho). Some common examples are: a minimum length for the password as longer passwords are harder to guess, a minimum and maximum age so that the same password isn’t used for extended periods of time, specific complexity requirements such as requiring a certain amount of character types like uppercase, lowercase, and special characters makes it hard to guess passwords even with software designed to guess passwords. Account lockouts should also be set up to restrict access to or disable a user’s account after a specified number of failed logons.
Often times, a network administrator creates a random password as the initial password for end users. The end user is typically required to change the password at first log on and can then set the password to whatever they want as long as it meets the complexity requirements. Networks should always require that end user passwords expire at certain intervals. This enhances the network’s security, however, the interval should not be so short that the users have to write the password down to remember which one they’re using.
When creating their own passwords, users should understand not to reuse parts of their name, logon name, email address, employee number, social security number, phone number, extension, or any other identifying name or code according to the Certified Information Systems Security Professional Study Guide (Steward, Tittel and Chapple). They should be advised not to set dictionary words, slang, or acronyms specific to an industry as their password but should instead use nonstandard capitalization and spelling and should switch letters and replace letters with numbers when possible for additional security.
The United States Computer Emergency Readiness Team cites three common mistakes users make when it comes to passwords. The biggest and most common mistake is using a weak password (Huth, Orlando and Pesante). They refer to it as “closing your front door but not locking it.” Dictionary terms, common phrases, your name and birthday constitute weak passwords as they are typically things that can be guessed easily. Using complex passphrases are much more secure. This means using a sentence or two and combining them, misspelling, adding numbers or special characters, and turning the sentences into shorthand create a strong passphrase. An example of this would be taking a sentence like “Complex passwords are safer”, according to Microsoft’s Safety & Security Center, and turning it into “ComplekspasswordsRsafer2001.”
The second mistake is using the same password for all accounts. If an attacker gains access to any one of a user’s accounts, they can access all of the user’s accounts if the same password is used for each one. It is more secure to use a separate password for each separate account and use a password manager to keep track of them. The third common mistake involves exposing passwords to others. This is done in a variety of ways maybe even without the user realizing it. Writing their passwords down, using public computers to log into accounts, and allowing your browser to remember your passwords are three of the common ways passwords are exposed to others.

Password Attacks

U.S. consumers have suffered more than $7.5 billion in damages due to malware and online scams according to Consumer Reports’ State of the Net 2009 survey (Consumer Reports). The majority of the losses came from malware while worms and viruses continue to cause billions of dollars in damage to corporate networks, email system, and data each year. As Kenneth and Jane Laudon explain in Essentials of Management Information Systems, malware is considered to be malicious software programs “which include a variety of threats such as computer viruses, worms, and Trojan horses (Laudon and Laudon).” Computer viruses consist of programs that attach executable files to other programs or files on a computer without the user realizing it causing the malicious program to be launched when the user performs a specific action. Worms are independent computer programs that copy themselves from computer to computer over a network. A Trojan horse is referred to as a software program that behaves in ways other than expected and serves as sort of a gate for viruses and worms to be introduced into a computer system. Often times, malware is used to send specific information to a certain computer system in order for malicious users to use the information for financial gain.
There are several ways a malicious user attempts to gain unauthorized access to a computer or network. One of the most common ways is by using network traffic analysis, also known as sniffing, where the attacker captures network traffic while users are attempting to authenticate and once they discover the password, they replay the packet against the network in order to gain access. Once they gain access, they can use a password cracking tool to extract usernames and passwords from the password database file. Once a password database file is stolen, an attacker can use a brute-force attack or a dictionary attack.
With a brute-force attack, attackers use a systematic trial of all possible character combinations to try and discover an account’s password. Similarly, a dictionary attack uses a script of common passwords and dictionary terms for the same purpose. Another common password attack is the hybrid attack which is a combination of a dictionary attack and then a brute-force attack. According to Stewart, Tittle, and Chapel, one way to monitor against these types of attacks is to use a password cracking tool on the password database file and require discovered passwords to be changed immediately (Steward, Tittel and Chapple).
Login spoofing attacks are also common these days. Attackers set up fake login screens that look like the real thing for a legitimate website, such as an online bank account. They email non-suspecting users with links to these login pages and some justification for the user to click on the link. When the user clicks on the link, it takes them to the fake login page where they put in the username and password for that site. The site records the user name and the password giving the attacker access to the user’s bank account.
Another common method for attackers to gain access to accounts is through social engineering. Attackers deceive a user into performing specific actions that give the attacker access to an account. For example, an attacker could call a helpdesk claiming to be somebody’s manager and request a password reset for their employee. Once the password is reset and they are given a temporary password, they are able to access the network under the employee’s account.

Authentication Methods and Password Management

Authentication is the process of verifying that a person is who they say they are. As mentioned previously, the most common authentication method is the password. There are three authentication type factors or information factors, according to the CISSP Study Guide, type 1 refers to something you know like a password, type 2 is something you have such as a one-time password token, and type 3 is something you are which could be a body part or other physical characteristic (Steward, Tittel and Chapple). Something you do and somewhere you are have been identified as two additional factors. Many organizations have started using multiple-factor authentication to grant access to secure resources. This way, if a token, a password, and a biometric factor are all used to authenticate, then a physical theft, a password crack, and a biometric duplication attack would all have to occur simultaneously and succeed in order to gain entry to the resource.

There are multiple authentication methods that can be used to create a stronger combination:

Public Key Infrastructure

According to The Government of Hong Kong’s Password Management, Public Key Infrastructure (PKI) uses mathematical algorithms to provide data confidentiality, data integrity and authentication in order to facilitate secure transactions (The Government of the Hong Kong Special Administrative Region). This technology provides proof of identity by using digital certificates. A digital certificate is a digital document which binds a public key to a person for authentication. A trusted Certificate Authority (CA) creates the digital certificate and digitally signs it using the CA’s private key which authenticates the identity of the requestor. PKI allows users to authenticate themselves on various applications without having to pre-register with the website and has proven particularly useful for companies that run multiple applications which require authentication.

Single Sign-On (SSO)

The single sign on method of authentication allows users to authenticate one time through the authentication server to access multiple applications both internal and external to the organization. This allows users to only need to keep track of one password for the multiple systems. Of course the downfall is if a single authentication event is compromised, all resources that the user has access to are compromised as well.

One-Time Password (OTP) Tokens

With the one-time password token, users are able to authenticate using two unique factors, types 1 and 2. This is referred to as two factor authentication. In this case, users authenticate with something they have which is the token, and something they know, which is the PIN or password. The physical token generates a one-time use password during specific intervals, every 90 seconds for example. The user will use that one-time password and the PIN for the token in order to authenticate which grants access to the protected resources. Many companies use this type of authentication for accessing their virtual private networks (VPNs).

Biometrics

The use of biometric factors is another common type of authentication method. This method falls under type 3, something you are. These are physical factors that are unique to an individual. Biometric factors include the following:

Fingerprints

The macroscopic patterns on the tips of the fingers and thumbs are used to authenticate.

Face Scans

Scanning the geometric patterns of the face is used for recognition.

Retina Scans

Measuring the pattern of blood vessels at the back of the eye are the most accurate form of biometric authentication.

Iris Scans

Iris scans are the second most accurate form, they focus on the colored area around the pupil but are unable to differentiate between identical twins as retina scans do.

Palm Scans

This is also known as palm topography and utilizes the entire area of the hand working much the same way as fingerprint scans.

Hand Geometry

This recognizes the physical dimensions of the hand including the width and length of the palm and fingers.

Heart Patterns

Measuring the user’s heartbeat ensures that a real person is attempting to authenticate.

Voice Pattern Recognition

This factor differentiates between one person’s voice and another relying on the sound of the user’s speaking voice.

Signature Dynamics

This examines how a subject performs the act of writing a string of characters.

Keystroke Patterns

This measures how the user types on a keyboard by analyzing flight time and dwell time.

Each of the biometric authentication factors has varying levels of accuracy and user acceptance. Which combination of authentication methods is dependent upon how secure the organization needs access to be and how much money they have available to spend on implementing such authentication methods.

Password Managers

A password manager is essentially an encrypted database that stores all of your passwords in one location that is protected by one master passphrase. There are a multitude of password management tools out there and it is important for each user or organization to pick the one that they are most comfortable with. Reading the consumer reviews on each of the tools will give a better idea of what people that have used it think about it. Many antivirus programs are now offering password managers as part of the computer security package as well.

Conclusion

While passwords are the most common method of authenticating on computer systems and websites, they are only effective when a single, strong passphrase is used for each account. Using password managers and other authentication methods significantly increase the security of computers and accounts by making it harder for attackers access the secured resources. User education plays a vital role in keeping networks safe from attack so strong password policies combined with a thorough understanding of how to be used appropriately will greatly reduce malicious attacks to user accounts and network resources reducing the massive monetary damages to users and organizations throughout the world.

Bibliography

Huth, Alexa, Michael Orlando and Linda Pesante. "Password Security, Protection, and Management." n.d. United States Computer Emergency Readiness Team. https://www.us-cert.gov/sites/default/files/publications/PasswordMgmt2012.pdf. 01 02 2015.

Laudon, Kenneth C. and Jane P. Laudon. "System Vulnerability and Abuse." Laudon, Kenneth C. and Jane P. Laudon. Essentials of Management Information Systems. Upper Saddle River: Pearson Education, Inc., 2011. 235-259. Book.

Londis, Dino. Informaton Week 10 Top Password Managers. 30 04 2013. http://www.darkreading.com/risk-management/10-top-password-managers/d/d-id/1109759? 01 02 2015.

Steward, James Michael, Ed Tittel and Mike Chapple. Certified Information Systems Security Professional Study Guide. Indianapolis: Wiley Publishing, Inc., 2011. Book.

The Government of the Hong Kong Special Administrative Region. "Information Security." February 2008. Password Management. www.infosec.gov.hk/english/technical/files/password.pdf. 01 02 2015.

Tomsho, Gregory. Guide to Networking Essentials. Boston: Course Technology, Cengage Learning, 2011. Book.

Consumer Reports. State of the Net 2009. June 2009.

Microsoft Safety & Security Center. Create Strong Passwords. 2012. Available from: http://www.microsoft.com/security/online-privacy/passwords-create.aspx. (accessed March 1, 2015).

-----------------------
March 1, 2015
Network Theory and Design

Similar Documents

Free Essay

Password Strength Is Not Password Security

...Password Strength is not Password Security Kevin Marino November 11, 2013 MSCC697, Regis University Professor Garcia Password Strength is not Password Security When password security becomes the topic of conversation it generally focuses on how strong a password is and whether or not the user reuses a password across multiple sites. While these aspects can affect password security, there are certain measures that the server side of the authentication process can implement to increase security without the user changing their habits. This approach would solve many of the security problems that authentication servers are facing. The goal of this study is to determine a set of best practices that can be implemented to increase security without the intervention of the user. While passwords may not be around forever, due to the introduction of new authentication hardware, they will be around until one of these hardware become mainstream and readily available to the general public. These practices will offer greater security until that time comes. User authentication in today's world generally requires a user name and a password. Though the strength of the user's password is generally seen as the base line for security, the authenticating server can implement certain security measures that can compensate for weak passwords. One main factor for considering different security measures is the advancement of brute force attack techniques...

Words: 1960 - Pages: 8

Free Essay

Csec 610

...Running Head: Lab Assignment: Password Cracking Using Cain and Abel Lab Assignment 1: Password Cracking Using Cain University of Maryland University College Fall 2015 Lab Report Provided below is a table of the different generated user accounts and their accompanied passwords, along with the methodology used to crack each and either the time it took to reveal the password or estimated time provided by Cain and Abel to generate a successful solution. NTLM HASH | | Brute Force | Dictionary Attack | User 1 | No result, due to estimated time > 4yrs | Password cracked in < 1min | UUser 2 | No result, due to estimated time > 4yrs | Password cracked in < 1min | UUser 3 | No result, due to estimated time > 4yrs | No result. Estimated Time > 3hrs. | Table1: NTLM password cracking results LM HASH | | Brute Force | Dictionary Attack | User 1 | Password cracked in < 3min | Password cracked in < 2 min | User 2 | Password cracked in < 3min | Password cracked in < 1min | User 3 | No result, estimated time >3hrs | No result, I stopped it after 5 min. | Table2: LM password cracking results 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? A dictionary attack uses a file containing words, phrases, common passwords, and other strings that are likely to be used as a password. Each word in the file is...

Words: 1638 - Pages: 7

Free Essay

Csec 610 Lab One

...performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? For the assignment we utilized Cain & Abel password recovery tool for Microsoft Operating Systems. For this lab assignment we utilized Brute Force NT LAN Manager (NTUM) and LAN Manager (LM) and Dictionary NTLM and LM hashes. (Features overview, n.d.) Brute Force is a password cracking -technique that tries every combination of numeric, alphanumeric, and special characters until the password is broken or the user is locked out. Dictionary is a technique that runs a given password against each of the words in a dictionary (file of words) until a match is found or the end of the dictionary is reached. (p. 13) Cain and Abel couples Brute Force and Dictionary with LM and NTLM hash. Based on my lab experience, my assessment is that the Dictionary NTLM Manager is the better of the processes. The table below reveals that Dictionary NTLM delivered more favorable results over LM because this process uncovered the passwords in the shortest amount of time and recovered the passwords in their entirety. Table | Brute Force LM | Brute Force NTLM | Dictionary LM | Dictionary NTLM | User1 | No password, 6-8 hours | No password, estimated time 10 years | yes, 75 seconds | yes, 40 | User2 | No password, 6-8 hours | No password, estimated time 10 years | yes, 30 | yes, 25 | User3 | No password, 6-8 hours | No password, estimated time 10 years | no, 180 | no, 75 | ...

Words: 971 - Pages: 4

Free Essay

Cis333 Week 5 Lab 4

...Lab 5 Assessment 4- Questions & Answers Lab Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization. • Change control is a precision arrangement of managing every change made to a system. This is to ensure that no unneeded changes are done, that every change is documented, and that no service is disrupted unless absolutely necessary, and that all resources efficiently used. 2. What type of access control system uses security labels? • A LBA C Label Base Access Control 3. Describe two options you would enable in a Windows Domain password policy. • Password must meet complexity requirements • Minimum Password length 4. Where would patch management and software updates fall under in security operations and management? • Procedures/ The SA or other personnel to be the responsible authority in informing all local authorities about patches that are related to software packages included on the entire inventory of the organizations software. • • Also in Procedures/ Additionally, any post-patch update distributions to the Database/Management Configuration Plan will be executed immediately after any patching has been done. 5. Is there a setting in your GPO to specify how many logon attempts will lock out an account? Yes, The Account Lockout Threshold can be set, this policy determines the number of failed attempts...

Words: 689 - Pages: 3

Free Essay

Project Part 5

...Security Proposal Information security policies and procedures are the cornerstone of any information security program - and they are among the items that typically receive the greatest scrutiny from examiners and regulators. But beyond satisfying examiners, clear and practical policies and procedures define an organization's expectations for security and how to meet those expectations. With a good set of policies and procedures, employees, customers, partners and vendors all know where you stand and where they fit in the information security scheme. The key to creating effective policies and procedures is to start with a solid risk assessment, and then follow a measured program that includes implementation, monitoring, testing, and reporting. Planning, implementing and monitoring security policies and procedures may vary from one network to the other, including different levels of security in LANs and WANs. There are logical and physical means to secure networks, and now we must pay special attention to securing the Internet, for instance web browsing and email. I have included a network access, procedure and policy proposal below: ABC Company Policy Section of Corporate Security Policies | Target audience ABC Company | Confidential | Page 1-5 | ABC Company Policy: Network Access and Authentication Policy Created: 8/15/2014 Section of: Corporate Security Policies Target Audience: CONFIDENTIAL Page: 1 of 5 ABC Company is now referred to as “the company.” 1.0 Overview ...

Words: 2042 - Pages: 9

Premium Essay

Richman Investment Remote Access Control Policy

...Richman Investment Richman Investment Remote Access Control Policy Document Remote Access Control Policy Document 01/14/14 01/14/14 Contents 1 Policy Statement 4 2 Purpose 4 3 Scope 4 4 Definition 4 5 Risks 4 6 Applying the Policy - Passwords 5 6.1 Choosing Passwords 5 6.1.1 Weak and strong passwords 5 6.2 Protecting Passwords 5 6.3 Changing Passwords 5 6.4 System Administration Standards 6 7 Applying the Policy – Employee Access 6 7.1 User Access Management 6 7.2 User Registration 6 7.3 User Responsibilities 6 7.4 Network Access Control 7 7.5 User Authentication for External Connections 7 7.6 Supplier’s Remote Access to the Council Network 7 7.7 Operating System Access Control 7 7.8 Application and Information Access 8 8 Policy Compliance 8 9 Policy Governance 8 10 Review and Revision 9 11 References 9 12 Key Messages 9 13 Appendix 1 10 Policy Statement Richman Investments will establish specific requirements for protecting information and information systems against unauthorised access. Richman Investments will effectively communicate the need for information and information system access control. Purpose Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of Richman Investments which must be managed with care. All information has a value to the Council. However, not all of this information has an equal...

Words: 2211 - Pages: 9

Premium Essay

Mobile Bi Dresner

...Secure Business Intelligence on Apple ® Mobile Devices MicroStrategy Mobile for iPhone and iPad MOBILE INTELLIGENCE Copyright Information All Contents Copyright © 2011 MicroStrategy Incorporated. All Rights Reserved. TRAdeMARk InfoRMATIon MicroStrategy, MicroStrategy 6, MicroStrategy 7, MicroStrategy 7i, MicroStrategy 7i evaluation edition, MicroStrategy 7i olap Services, MicroStrategy 8, MicroStrategy 9, MicroStrategy distribution Services, MicroStrategy MultiSource option, MicroStrategy Command Manager, MicroStrategy enterprise Manager, MicroStrategy object Manager, MicroStrategy Reporting Suite, MicroStrategy Power User, MicroStrategy Analyst, MicroStrategy Consumer, MicroStrategy email delivery, MicroStrategy BI Author, MicroStrategy BI Modeler, MicroStrategy evaluation edition, MicroStrategy Administrator, MicroStrategy Agent, MicroStrategy Architect, MicroStrategy BI developer kit, MicroStrategy Broadcast Server, MicroStrategy Broadcaster, MicroStrategy Broadcaster Server, MicroStrategy Business Intelligence Platform, MicroStrategy Consulting, MicroStrategy CRM Applications, MicroStrategy Customer Analyzer, MicroStrategy desktop, MicroStrategy desktop Analyst, MicroStrategy desktop designer, MicroStrategy eCRM 7, MicroStrategy education, MicroStrategy eTrainer, MicroStrategy executive, MicroStrategy Infocenter, MicroStrategy Intelligence Server, MicroStrategy Intelligence Server Universal edition, MicroStrategy MdX Adapter, MicroStrategy narrowcast Server, MicroStrategy...

Words: 6771 - Pages: 28

Free Essay

Its-325 Linux

...If our business grew to 6 million transactions per year, we would need to conduct an annual internal audit, in addition to the PCI scans. Some of the basics for PCI functionality includes, network hardening on web applications to protect cardholder data, including (but not excluded to) password policy enforcement, encryption, maintaining secure systems, keeping systems up to date on anti-virus, restricting business access to cardholder data, restricting physical access to data, tracking and monitoring access to all network resources, regular tests on security. If our web applications evolved into more services such as shareholder infrastructure, we would need to delve into the SOX regulations. Because we are offering loan services, we would need to abide by the Gramm Leach Bliley Act rules. Some of this would involve privacy notices about how we divulge their data.  Assess the feasibility of Linux and open source infrastructure in handling security demands listed by the legislation and regulations. The biggest feasibility issue is the adaptability in general of open sourced software. As the industry needs change, the ability for the software to adapt is also possible. Security would be the biggest issue since it in the banking industry. By following a good framework that...

Words: 1024 - Pages: 5

Free Essay

Unit 1 Assignment 1

...the shop floor folder. 2. Password changes require very special semantics that are enforced by the server, and developers need to understand these semantics for password management applications to be successful. In order to try to facilitate the password management process, ADSI exposes two methods on the IADsUser interface: SetPassword and ChangePassword. SetPassword is used to perform an administrative reset of a user’s password and is typically performed by an administrator. Knowledge of the previous password is not required. ChangePassword is used simply to change the password from one value to another and is typically performed only by the user represented by the directory object. It does require knowledge of the previous password, and thus it takes the old and new passwords as arguments. 3. You need to create a new Active Directory domain and Create new user accounts for all users. Then you need to manually join these computers to the AD domain. Or you can script it using Netdom command. When you join computers to AD domain, users will get a new profile. If you are using Windows XP, you can use moveuser.exe to preserver these user profile. 4. Change The Account Name Change The Password (or Create A Password if the account does not currently have one) Remove The Password (if one is currently configured) Change The Account Type 5. Administrators can use access control to manage user access to shared resources for security purposes. In Active Directory...

Words: 415 - Pages: 2

Premium Essay

Chapter 5

...identify the security-specific applications. A: Advanced security option, an application that offers encryptions and authentication tools to keep data confidential and secure both inside the database and while in transit. Label Security, a set of tools designed to provide multitiered security capabilities for protecting data by classifying data for which access rights and privileges are then assigned and monitored. Oracle Active Data Guard, improves performance and ensures data recovery by maintaining a replica of a main database to act as a secondary database for workload sharing and failsafe. 3. Explain the advantages and disadvantages of offering an unrestricted, freely downloadable full version of Oracle Database to learners and developers. A: Oracle offers a free download of all editions of the Oracle Database for purposes of education, testing, or development. Personal info or a license key is not required. Disadvantages to this may include granting crackers or cyber threats the ability to freely download versions of Oracle Database for the purpose of understanding how to damage it without any real repercussions. 4. Explain two different password policies that can be enforced on an Oracle Server. A: A password is the first defense in maintaining a secure account. The default password for all unlocked accounts needs to be changed either during or immediately after an install. Passwords should also follow strong security standards, creating strong passwords for...

Words: 384 - Pages: 2

Free Essay

The Security Authentication Process

...The Security Authentication Process Simply put, authentication is the process by which a subject’s (or user’s) identity is verified (Conklin, White, Williams, Davis, & Cothren, 2012). An example of authentication most people are familiar with is their e-mail login. For instance, Gmail requires a person’s Gmail address and individual password to access his or her Gmail account. However, there are numerous types of authentication outside the common username and password. Furthermore, authentication is used in numerous areas of a system to re-verify a user’s identity when he or she is accessing a new area of the system, accessing encrypted data types, and securing the preservation of a system. This paper evaluates the different authentication types, their applications, and additional security measures for securing a system and its data. Types of Authentication According to Whitman and Mattford (2010), there are four types of authentication mechanisms, which are: * Something a person knows (passwords or passphrases) * Something a person has (such as cryptographic tokens or smartcards) * Something a person is (a fingerprint, retina or iris scan, or hand topography or geometry * Something a person produces (such as voice or pattern recognition) The level of access control associated with a system and the data contained on the system is determined by legislation (varies geographically) governing data, and control policies developed and implemented by the...

Words: 1415 - Pages: 6

Free Essay

Lab 1 Assessment Questions

...department LANs, departmental folders, and data. By establishing security principle within the Active Directory Domain. 2. Is it a good practice to include the account and user name in the password? Why or Why not? No it is not a good idea to include the account and user name in the password because there are Hackers out there who would use either a dictionary attack or brute force attacks which go though lists to find the correct combination of words, letters, numbers and characters in order to crack user names and passwords which depending on how simple or complex it is can take anywhere from 5 minutes or 5 months to decrypt, so it is a good practice to keep everything as unique as possible. 3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality? In this case the best way to ensure a strong password is to use 8 or more characters such as a mixture of Uppercase. Lowercase, numbers, and symbols in order to create a complex password that would be very difficult to crack. 4. Can a defined user in Active Directory access a shared drive if that user is not part of the domain? No they should not be able to access the shared folders unless they have authorized access. 5. Does Windows Server 2008 R2 require a user’s logon/password credentials prior to accessing shared drives? Yes this has to be done in order to ensure security. 6. When looking at the Active Directory structure for Users...

Words: 469 - Pages: 2

Free Essay

Biometrics

...by Ratna Sudha.R CONTENTS 1. Introduction 2. Security and authentication 3. Methods of verification a. Psychological verification i. Finger Print. ii. Hand Print. iii. Face Measurement. iv. Retinal Scanning. v. DNA Analysis. b. Behavioral verification i. Typing. ii. Signature. iii. Voice. 4. Identification. 5. Verification. 6. Advantages 7. Limitations 8. Conclusion. 9. References Introduction Biometrics is an advanced technology for superb security and authentication .The very term "biometric” it represent that "bio" means related to the biological study and "metric " means something, which is related to measurement. In network environment security is a crucial factor. Provide security to pages in the network is to difficulty. Password is not a good measurement for security. Good security mechanism is necessary on the Internet. Security in different levels applies to various documents. Security is depends how security assign to documents. Security depends on following categories. 1. Confidential 2. Secret 3. Non-secret 4. Public Confidential pages over the network provide full security. No way to tamper data in the page by third party. In this case biometrics are more useful and no way to disturb...

Words: 1911 - Pages: 8

Free Essay

Is3340 Week 4

...KAMRAN JAN WK4 Assignment 1 Security policy statements: 1. Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess. Require all personnel attend a lunch and learn session on updated security policies. 2. Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only. Create a set of new user accounts with administrator privileges and disable all ‘administrator’ user accounts. 3. Anonymous users of Ken 7 Web application should only be able to access servers located in the demilitarized zone (DMZ). No anonymous Web application users should be able to access any protected resources in the Ken 7 infrastructure Place a firewall between your Web server and your internal network. . 4. To protect servers from attack, each server should authenticate connections based on the source computer and user. Implement Kerberos authentication for all internal servers. 5. Passwords should not be words found in the dictionary. Enforce password complexity. 1. The ERP software vendor reports that some customers have experienced denial-of-service (DoS) attacks from computers sending large volumes of packets to mail servers on the Web...

Words: 344 - Pages: 2

Premium Essay

Unit 7 Assignment 1 Ad Password Policy Planning

...Unit 7 Assignment 1 AD Password Policy Planning TO: Client I can understand you’re concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose productivity over trying to secure your networks information. Simple measure like user names and passwords can be used to protect less sensitive information however how strong you make those usernames and passwords can have a great effect on how well your information is protected. I’m going to give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the “Active Directory Users and Computers” in the Domain icon in the left pane click on the “Users” icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “JVentura10415867@Domain*%$.Local” if someone...

Words: 470 - Pages: 2