CAB240 Lecture Notes - Lecture 4: Access Control, Authenticator, Feature Extraction

178 views5 pages
23 Oct 2018
School
Course

Document Summary

What is user authentication: process used to decide whether the identity a user claims is genuine (authentic) or not. Important if decisions are based on user identity. Systems to authenticate users need to: consider user id and provided authenticator, decide whether user is authentic or not. Knowledge based - something you know: characterised by secrecy or obscurity, commonly used are passwords (user selected, reusable), pins, and security questions, advantages to this are: readily accepted by users, and low cost implementation. Reusable passwords: most commonly used authenticator, user provides username and password. System stores value and uses it to compare: requirements, user must store password securely. Store password securely: use a strong password, don"t share password w/ other entities, don"t use same password for multiple systems. Selection strategies: user selected, or, computer generated. System requirements: need to store passwords securely, no non-repudiation if password is known to system (or others outside the system)

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents