computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 16
Chapter 16 –  Identification and Authentication
     Ravi Sandhu

Chapter Contents:

   16.1    Introduction
   16.2    Four Principles of Authentication
   16.2.1    What You Know
   16.2.2    What You Have
   16.2.3    What You Are
   16.2.4    What You Do
   16.3    Password-based Authentication
   16.3.1    Access to User Passwords by System Administrators
   16.3.2    Risk of Undetected Theft
   16.3.3    Risk of Undetected Sharing
   16.3.4    Risk of Weakest Link
   16.3.5    Risk of Online Guessing
   16.3.6    Risk of Offline Dictionary Attacks
   16.3.7    Risk of Password Replay
   16.3.8    Risk of Server Spoofing
   16.3.9    Risk of Pas[s]word Reuse
   16.4    Token-based Authentication
   16.4.1    One-Time Password Generators
   16.4.2    Smart Cards and Dongles
   16.4.3    Soft Tokens
   16.5    Biometric Authentication
   16.5.1    Binding Biometrics to a Known Identity
   16.5.2    Input of Biometric Data
   16.5.3    Power of Discrimination
   16.5.4    Loss of Biometric Identifier
   16.5.5    Security of Templates
   16.5.6    Privacy Concerns
   16.6    Concluding Remarks
   16.7    Summary
   16.8    For Further Reading

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved