Authentication Systems

Descrição

Mapa Mental sobre Authentication Systems, criado por Davide Cometa em 18-11-2017.
Davide Cometa
Mapa Mental por Davide Cometa, atualizado more than 1 year ago
Davide Cometa
Criado por Davide Cometa quase 7 anos atrás
31
0

Resumo de Recurso

Authentication Systems

Anotações:

  • Authentication of a human, a software or an hardware system against a relaying party.
  1. Authentication mechanisms based on
    1. Knowledge
      1. Ownership
        1. Inherence
          1. Different mechanism of authentication can be combined to obtain higher levels of authentication

            Anotações:

            • Multi-factor authN: more factors are combined (do not use the same factor twice e.g. two passwords).
            1. One-factor authN
              1. Two-factor authN
                1. Three-factor authN
              2. Password-based Authentication
                1. One problem is the storage of the password on the server side
                  1. in clear -> anyone can access it
                    1. encrypted -> the key should be saved
                      1. Hashed -> unprotected digests are subject to dictionary attacks
                        1. Hashed with salt -> unpredictable digests are stored. Dictionary attacks and rainbow tables are made impossible
                      2. Challenge-Response Authentication
                        1. Symmetric CRA
                          1. Asymmetric CRA
                          2. One-time password Authentication

                            Anotações:

                            • a simple authentication technique where the password is used only once as authentication information to verify the identity
                            1. Synchronous

                              Anotações:

                              • password depends on time
                              1. RSA SecurID

                                Anotações:

                                • It is a proprietary solution intrinsically connected with the producer.
                              2. Asynchronous
                                1. S/KEY
                                2. Event-based OTP
                                  1. OOB OTP

                                    Anotações:

                                    • A sort of Password-based authN that increments security by using an out of band OTP exchange (SMS, PSTN are deprecated)
                                    1. Different solutions that are not interoperetable is not good. A common standard has been developed
                                      1. OATH
                                        1. HMAC OTP
                                          1. TOTP
                                            1. OCRA
                                              1. PSKC
                                                1. DSKPP
                                            2. Biometric Authentication
                                              1. Captcha
                                                1. Biometric Techniques
                                                  1. API/SPI standardized by CDSA
                                                    1. FIDO
                                                  2. Zero Knowledge Password Proof
                                                    1. SSO - Single Sign-On
                                                      1. Fictious

                                                        Anotações:

                                                        • Different services require different authentication passwords that are provided by a manager that asks for a global password (like the password wallet, that automatically manages pwds and authNs).
                                                        1. Integral
                                                          1. Multi-application

                                                            Anotações:

                                                            • asymmetric challenge-response systems. All the services are able to recognize the same user credential.
                                                            1. Kerberos
                                                            2. Multi-domain

                                                              Anotações:

                                                              • A service accepts the credential of a service in another domain (like the access with google account on different websites).

                                                          Semelhante

                                                          Guia de Estudos para OAB 1a Fase
                                                          Alessandra S.
                                                          Figuras de Linguagem
                                                          Mah1408
                                                          Seguridade Social e o PAS
                                                          Clara Fonseca
                                                          A U T A R Q U I A
                                                          Jean Pierre Silva
                                                          HARDWARE e SOFTWARE
                                                          Fabricio Santos
                                                          EA-HSG-2011 Questões achadas no app QUIZADA na playstore
                                                          carloshenriquetorrez .
                                                          Mapa Conceitual com GoConq
                                                          Alessandra S.
                                                          SmartStudy Flash Cards - Estrutura do Sistema Financeiro Nacional
                                                          Jáder da Mota Mendonça
                                                          1ª GUERRA MUNDIAL
                                                          Renata Reis
                                                          Características do Trovadorismo
                                                          gvitoriaaraujp12