Unit-4-User-Authentication.pptx

PuskarBhandari1 554 views 11 slides Apr 15, 2023
Slide 1
Slide 1 of 11
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11

About This Presentation

information security


Slide Content

Unit-4 User Authentication

User Authentication Principles User authentication is the process of verifying the identity of a user or device before granting access to a system or network. There are several principles that are important to consider when designing and implementing user authentication systems: Strong passwords: Use passwords that are difficult for others to guess or crack. This includes using a mix of upper and lower case letters, numbers, and special characters, and avoiding using common words or personal information. Two-factor authentication: Use an additional layer of security, such as a code sent to a mobile phone or a biometric factor like a fingerprint, to verify the identity of the user. Least privilege: Grant users the minimum level of access needed to perform their job functions. This helps to prevent unauthorized access to sensitive information. Secure password storage: Store passwords in an encrypted format to protect against unauthorized access in the event that the database is compromised. Regular password updates: Require users to update their passwords on a regular basis to ensure that they remain secure. Access logs: Keep track of user access to systems and networks to help identify and prevent unauthorized access. By following these principles, you can help ensure the security of your systems and protect against unauthorized access

Password Based Authentication Password-based authentication is a method of verifying a user's identity by requiring them to enter a password or passphrase. This is a common form of authentication used by many websites and applications to ensure that only authorized users can access certain resources or perform certain actions. Important considerations: Use strong passwords: It's important to use strong, unique passwords for each account to prevent unauthorized access. This can help protect against password cracking and brute force attacks. Enable two-factor authentication: Two-factor authentication (2FA) adds an extra layer of security by requiring the user to provide an additional piece of information, such as a code sent to their phone, in order to log in. Change passwords regularly: Regularly changing passwords can help protect against unauthorized access in the event that a password is compromised. Use a password manager: A password manager can help you generate and store strong, unique passwords for all of your accounts, making it easier to follow best practices for password security.

Token Based Authentication Token-based authentication is a method of verifying a user's identity by requiring them to provide a unique token, or code, in order to access certain resources or perform certain actions. Advantages: it is satateless , sclable , secure and flexible. Disadvantages: It requires a secure means of storing and transmitting tokens and can be complex to implement

Biometric Authentication Biometric authentication is a method of verifying a user's identity by measuring and analyzing a unique physical characteristic or behavioral trait. Some examples of biometric authentication methods include: Fingerprint recognition: This involves using sensors to scan and measure the unique patterns on a person's finger, which can then be used to verify their identity. Facial recognition: This involves using cameras and software to analyze and measure the unique characteristics of a person's face, such as the distance between their eyes and the shape of their nose. Voice recognition: This involves using microphones and software to analyze and measure the unique characteristics of a person's voice, such as their pitch and accent. Hand geometry: This involves using sensors to measure the shape and size of a person's hand, which can then be used to verify their identity.

TWO Factor Authentication Two-factor authentication (2FA) is a method of verifying a user's identity by requiring them to provide two pieces of information in order to access certain resources or perform certain actions. In 2FA, the user is typically required to provide both their username and password, as well as an additional piece of information, in order to log in to the system This additional piece of information is usually something that the user has in their possession, such as a mobile phone or a hardware token, or something that is unique to the user, such as a fingerprint or facial recognition.

Security Issues for User Authentication There are several security issues that can arise when implementing user authentication: Weak passwords: If users choose weak passwords, it can be easier for attackers to guess or crack them, potentially leading to unauthorized access to the system. Password reuse: If users reuse the same password for multiple accounts, it can be easier for attackers to gain access to multiple systems if one of their passwords is compromised. Password storage: If passwords are not stored securely, such as by using a secure hashing algorithm, it can be easier for attackers to obtain them and gain unauthorized access to the system. Social engineering attacks: Attackers can try to trick users into revealing their login credentials through social engineering techniques, such as phishing attacks or pretexting. Man-in-the-middle attacks: Attackers can try to intercept communications between the user and the system in order to gain access to login credentials. Insecure authentication protocols: If the authentication protocols used by the system are insecure, it can be easier for attackers to gain access to the system. Lack of two-factor authentication: If the system does not use two-factor authentication, it can be easier for attackers to gain access to the system if they are able to obtain a user's login credentials. To address these security issues, it is important to implement strong password policies, encourage users to use unique passwords for each account, store passwords securely, use two-factor authentication, and educate users about the risks of social engineering attacks

Describe the general concept of a challenge-response protocol A challenge-response protocol is a security mechanism designed to authenticate the identity of a user or a device requesting access to a system or a resource. In a challenge-response protocol, the system or server sends a challenge to the user or device, which requires a specific response to prove its identity. The challenge is typically a random string of characters or a cryptographic hash, and the response is generated by the user or device based on a secret key or a password. The basic steps in a challenge-response protocol are as follows: The system sends a challenge to the user or device. The user or device receives the challenge and generates a response using a secret key or password. The user or device sends the response back to the system. The system verifies the response and grants access if the response is valid. The use of a challenge-response protocol helps to prevent unauthorized access to a system or resource by requiring proof of identity before granting access. The protocol is commonly used in a variety of security applications, such as authentication for remote access, password recovery, and online transactions.

Define authentication system with its components An authentication system is a security mechanism used to verify the identity of a user or entity trying to access a system or resource. It involves a series of steps to ensure that the user or entity is indeed who they claim to be. The components of an authentication system typically include: User identification : This involves collecting information about the user, such as a username, email address, or employee ID. Credentials: These are the proof of identity that the user presents to the system. Examples of credentials include passwords, PINs, security tokens, biometric data, and smart cards. Authentication server : This is the central component of the system that stores and manages user credentials. It is responsible for validating the user's credentials and determining whether or not the user is authorized to access the requested resource.

Define authentication system with its components Authentication protocols : These are the rules and procedures that the system uses to verify the user's identity. Examples of authentication protocols include the OAuth, SAML, OpenID Connect, and Kerberos. Access controls : Once the user has been authenticated, the system uses access controls to determine what resources the user is authorized to access. These access controls can be based on role-based access control, attribute-based access control, or other methods. Audit trail : An audit trail is used to record all authentication attempts, successful or not, and can be used for forensic purposes or compliance reasons.