CSCE 201 Identification and Authentication Microsoft support Fall 2010.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Help! I Forgot My Password for ADP Self Service!
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Password Reset Instructions PART 1 The following set-up tasks must be performed first in order to use the Automated Password Reset feature. 1.Log into.
CSC 474 Information Systems Security
Welcome to Florida International University Online J.O.B.S. Link Applicant Tutorial.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
第十章 1 Chapter 10 Authentication of People. 第十章 2 Introduction This chapter deals with password-related issues like how to force users to choose unguessable.
95752:3-1 Access Control :3-2 Access Control Two methods of information control: –control access –control use or comprehension Access Control Methods.
CS470, A.SelcukAuthentication Systems1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Welcome to the Colgate University Online Employment System Applicant Tutorial.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Security systems need to be able to distinguish the “white hats” from the “black hats”. This all begins with identity. What are some common identifiers.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
1 Welcome to GE! The attached presentation has been put together to assist you in completing your required I-9 form through the use of our I-9 wizard.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Lifecycle Workstation Operator Training: PIN Reset and Certificate Update Updated April 17, 2012.
Chapter 1 Getting Started. 2Practical PC 6th Edition Chapter 1 Getting Started FAQs Where’s the power switch? What is the boot process? What is a user.
10/8/20151 Computer Security Authentication. 10/8/20152 Entity Authentication Entity Authentication is the process of verifying a claimed identity It.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
1. Chapter 25 Protecting and Preparing Documents.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
New Hire Registration for ADP Self Service
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Multifactor Identification for Internet Banking Citizens State Bank Monticello, Iowa
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
Project 2 Working on the Windows XP Desktop Windows XP Service Pack 2 Edition Comprehensive Concepts and Techniques.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
G53SEC 1 Authentication and Identification Who? What? Where?
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Creating and Using Your FSA ID: An Overview
Authentication What you know? What you have? What you are?
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
Access Control / Authenticity Michael Sheppard 11/10/10.
Password Reset Instructions PART 1 The following set-up tasks must be performed first in order to use the Automated Password Reset feature. 1.Log into.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
CSCE 201 Identification and Authentication Fall 2015.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Backstage View  After you click the File tab, you can see the Microsoft Office Backstage view  The Office Backstage view is where you manage your files.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Technical Devices for Security Management Kathryn Hockman COSC 481.
Computer Security Set of slides 8 Dr Alexei Vernitski.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
CSCE 522 Identification and Authentication
Creating and Using Your FSA ID: An Overview
CSCE 522 Identification and Authentication
Challenge/Response Authentication
© 2015 Air Force Association
Bonneville Junior High’s Locker Program
WELCOME.
Reset Windows Vista Password--Never Easier than before
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Computer Security Authentication
Computer Security Protection in general purpose Operating Systems
Presentation transcript:

CSCE 201 Identification and Authentication Microsoft support Fall 2010

CSCE Farkas2 One-time Password Use the password exactly once!

CSCE Farkas3 Time Synchronized There is a hand-held authenticator – It contains an internal clock, a secret key, and a display – Display outputs a function of the current time and the key – It changes about once per minute User supplies the user id and the display value Host uses the secret key, the function and its clock to calculate the expected output Login is valid if the values match

CSCE Farkas4 Time Synchronized Secret key Time One Time Password Encryption

CSCE Farkas5 Challenge Response Work station Host Network Non-repeating challenges from the host is used The device requires a keypad User ID Challenge Response

CSCE Farkas6 Challenge Response Secret key Challenge One Time Password Encryption

CSCE Farkas7 Devices with Personal Identification Number (PIN) Devices are subject to theft, some devices require PIN (something the user knows) PIN is used by the device to authenticate the user Problems with challenge/response schemes – Key database is extremely sensitive – This can be avoided if public key algorithms are used

CSCE Farkas8 Smart Cards Portable devices with a CPU, I/O ports, and some nonvolatile memory Can carry out computation required by public key algorithms and transmit directly to the host Some use biometrics data about the user instead of the PIN

CSCE Farkas9 Biometrics Fingerprint Retina scan Voice pattern Signature Typing style

CSCE Farkas10 Problems with Biometrics Expensive – Retina scan (min. cost) about $ 2,200 – Voice (min. cost) about $ 1,500 – Signature (min. cost) about $ 1,000 False readings – Retina scan 1/10,000,000+ – Signature 1/50 – Fingerprint 1/500 Can’t be modified when compromised

CSCE Farkas11 Home Computer Security

CSCE Farkas12 Required reading: Forgotten your Windows XP Home password? - Part 1: Introduction, Forgotten your Windows XP Home password? - Part 2: Using a password reset disk, ushttp://support.microsoft.com/kb/894901/en- us Forgotten your Windows XP Home password? - Part 3: Setting a new password as an administrator,

CSCE Farkas13 Problem: You don’t remember your password Solutions: 1. Verify that you have typed the letters of your password in the correct case 2. Access a password hint on the Welcome screen 3. Use a password reset disk 4. Log on as administrator to assign a new password to your account

CSCE Farkas14 Password Case Sensitivity Check CAPS LOCK key Question: Why do you want to use combination of symbols for your password?

CSCE Farkas15 Use a Password Hint Create a password hint: – Log on to your computer – Click Start, and then click Control Panel – Double-click User Accounts – Click your user account, and then click Change my password – Enter your current password, enter a new password, and then enter the new password again to confirm it – Enter the password hint, and then click Change Password – The change will take effect the next time that you log on To display the hint, click the question mark (?) that is next to your user account

CSCE Farkas16 Create a Password Reset Disk Click Start, and then click Control Panel Double-click User Accounts Click your user account, and then click Prevent a forgotten password. The Forgotten Password Wizard starts Follow the instructions NOTE: A password reset disk is valid until you create a new one; even if you change your password

CSCE Farkas17 Using the Password Reset Disk Create a password reset disk for your user account at the earliest opportunity How to use the password reset disk – Microsoft Windows remembers if you have created a password reset disk. Just click use your password reset disk – Follow the instructions of the Password Reset Wizard Question: Why should you safeguard your password reset disk?

CSCE Farkas18 Set a New Password as an Administrator Start the computer in Safe Mode Log on as administrator – first time login as administrator: no password assigned to the account Reset the password

CSCE Farkas19 Reset the Password Click Start, click Control Panel, and then double-click User Accounts Click your user account, and then click Change the password Enter a new password, enter it again to confirm the password, and then set a password hint. Click Change Password Set a password for the administrator account if you had none Question: Why is it recommended that you assign a password to the Administrator account?

CSCE Farkas20 Beware of Social Engineering! Kevin Mitnick story T. Espiner: Newsmaker: Kevin Mitnick, the great pretender, CNET News, 2006, pretender/ _ html pretender/ _ html T. Shimomura and J. Markoff, Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw-By the Man Who Did It, 1996, Computer-Outlaw/dp/ Computer-Outlaw/dp/ Question: Would you hire a reformed hacker to maintain your security?

Next Class Access Control An Introduction to Computer Security: The NIST Handbook, : Chapter 17, LOGICAL ACCESS CONTROL, pages Microsoft support, Use access control to restrict who can use your files, 2001, 2005, Sudhakar Govindavajhala and Andrew W. Appel, Windows Access Control Demystied, 2006,