SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Computer Security Management
(ISYS20261)
Lecture 14 – More on Passwords




 Module Leader: Dr Xiaoqi Ma
 School of Science and Technology
Last week …

• Passwords
• PINs
• Challenge-response




Computer Security Management
Page 2
Today

• Captchas
• Graphical passwords
• How to recover a forgotten password




Computer Security Management
Page 3
Captchas (1)

• Completely Automated Public Turing test to tell Computers and
  Humans Apart (von Ahn, Blum, Hopper and Langford, 2000)
• Challenge-response test to ensure that the user is a human
  – E.g. to prevent automated account harvesting

• Captcha is a computer generated puzzle, i.e. a distorted image of a
  number/character sequence
• User has to type in the number/character sequence
• Most humans can read the image but current software can’t
• Examples:




Computer Security Management
Page 4
Captchas (2)

• Sequence:                                           System



                                         request




                                         "squestra"


                                     authenticated




 • Problems:
   – Blind or visually impaired users?
   – Mobile devices with limited hardware capabilities?




Computer Security Management
Page 5
How to crack Captchas

• Human operators (“Sweatshop”)


• Forward captcha from original site onto attackers web site and let
  users unwittingly solve the puzzle! (in real time)

                                                        Attacker's
                                                                                           System
                                                         web site


                               request to logon to
                               Attacker's 'free' site                request to logon to
                                                                       'protected' site




                                      "squestra"
                                                                          "squestra"


                                                                         authenticated
                                   authenticated




Computer Security Management
Page 6
Graphical authentication

• Human memory for images is better than for words
• New approach: graphical (image based) authentication
• Graphical passwords
  – Recognition based
  – User to select picture among a set of distractors
  – Example: PassFaces

• Position based passwords
  – Click on right region on an image (challenge)
  – Chose the correct pattern
  – Example: GrIDsure




Computer Security Management
Page 7
Password recovery

• Passwords are often forgotten
  – Infrequent use
  – Forced change (due to password policy)
  – etc

• Password (credential) needs to be recovered
• Easy option: send me a new (or my old) password via email

• Not really secure!
• Need for authentication
• Better option: challenge-response based recovery




Computer Security Management
Page 8
Credential recovery

• User-triggered process to reset forgotten passwords
• Uses knowledge-based authentication
• Two varieties
  – Answering enrolled challenges
  – Recovery without enrolment




Computer Security Management
Page 9
Recovery with enrolment

• Users enrol set of challenges and responses
• On re-set they have to prove their identity by answering challenges
• Issues
  – Which challenge-responses should be used?
  – Who chooses them?




Computer Security Management
Page 10
Recovery without enrolment

• Probing knowledge shared between system and user:
  – Probing recent interactions with the system, e.g. “what was last transaction?”
  – Personal history, e.g. calendar entries
  – Recognition of items user should be familiar with, e.g. own photo from a set of
    mixed ones




Computer Security Management
Page 11
Security aspects of challenge-response pairs

• Guessing difficulty
  – low expectation for a successful guess within a small number of attempts
  – answer should come from a uniform distribution – is this realistic?

• Observation difficulty
  – it should be difficult for an attacker to retrieve or observe the answer
  – answers should not be available from public sources, e.g. social networking
    websites
  – observation difficulty will differ for individuals, e.g. family, friends, colleagues or
    strangers

• Capture difficulty
  – Covert recording of answers
  – How many recovery attempts does an attacker have to observe in order to
    launch a successful attack?



Computer Security Management
Page 12
Questions

• Fixed
  – Administrator-chosen to Prevents choice of poor questions

• Open
  – User-chosen personally memorable content

• Controlled
  – Fixed set of questions but user can select and modify
  – Often combined with hints




Computer Security Management
Page 13
Answers

• Fixed
  – User chooses one answer from a set
  – Common answers need to be barred!

• Open
  – Free form text

• Controlled
  – User-modified answer
  – Format of answer is controlled




Computer Security Management
Page 14
Challenge-response pairs

• Fixed-controlled
• Fixed-open
• Controlled-fixed




Computer Security Management
Page 15
Comments

• Credential recovery systems need to be carefully planned and
  designed
• Infrequent usage
  – mechanism should be forgiving
  – users may remember cues, but not details (e. g. word but not upper/lower
    case)

• Consider cost of setting up and maintaining system
• Currently text-based, but could involve photos or music
• Can be combined with other techniques, e.g. captchas




Computer Security Management
Page 16

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (10)

Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Isys20261 lecture 03
Isys20261 lecture 03Isys20261 lecture 03
Isys20261 lecture 03
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 

Ähnlich wie Computer Security Management Lectures

Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdfMarlboroAbyad
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgerymorisson
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwordsChikaDavidAma
 
Hacking Virtual Appliances
Hacking Virtual AppliancesHacking Virtual Appliances
Hacking Virtual AppliancesJeremy Brown
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Chris Gates
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaAlphageeks
 
Human/User-Centric Security
Human/User-Centric SecurityHuman/User-Centric Security
Human/User-Centric SecurityShujun Li
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Jason Hong
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,Olajide Kuku
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptxFAKHARZAMANPROUD
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.pptajajkhan16
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...IBM Security
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password AuthenticationAbhijit Akotkar
 

Ähnlich wie Computer Security Management Lectures (20)

Isys20261 lecture 13
Isys20261 lecture 13Isys20261 lecture 13
Isys20261 lecture 13
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
Sql securitytesting
 
Threat_Modelling.pdf
Threat_Modelling.pdfThreat_Modelling.pdf
Threat_Modelling.pdf
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
Crash Course In Brain Surgery
Crash Course In Brain SurgeryCrash Course In Brain Surgery
Crash Course In Brain Surgery
 
A presentation on graphical passwords
A presentation on graphical passwordsA presentation on graphical passwords
A presentation on graphical passwords
 
Hacking Virtual Appliances
Hacking Virtual AppliancesHacking Virtual Appliances
Hacking Virtual Appliances
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez Metula
 
Human/User-Centric Security
Human/User-Centric SecurityHuman/User-Centric Security
Human/User-Centric Security
 
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
Knock x Knock: The Design and Evaluation of a Unified Authentication Manageme...
 
educational content,educational content,educational content,
educational content,educational content,educational content,educational content,educational content,educational content,
educational content,educational content,educational content,
 
informations_security_presentations.pptx
informations_security_presentations.pptxinformations_security_presentations.pptx
informations_security_presentations.pptx
 
20-security.ppt
20-security.ppt20-security.ppt
20-security.ppt
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
Graphical Password Authentication
Graphical Password AuthenticationGraphical Password Authentication
Graphical Password Authentication
 

Mehr von Wiliam Ferraciolli

Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experienceWiliam Ferraciolli
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objectsWiliam Ferraciolli
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and servicesWiliam Ferraciolli
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scriptingWiliam Ferraciolli
 

Mehr von Wiliam Ferraciolli (9)

Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Lecture 9 further permissions
Lecture 9   further permissionsLecture 9   further permissions
Lecture 9 further permissions
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 

Computer Security Management Lectures

  • 1. Computer Security Management (ISYS20261) Lecture 14 – More on Passwords Module Leader: Dr Xiaoqi Ma School of Science and Technology
  • 2. Last week … • Passwords • PINs • Challenge-response Computer Security Management Page 2
  • 3. Today • Captchas • Graphical passwords • How to recover a forgotten password Computer Security Management Page 3
  • 4. Captchas (1) • Completely Automated Public Turing test to tell Computers and Humans Apart (von Ahn, Blum, Hopper and Langford, 2000) • Challenge-response test to ensure that the user is a human – E.g. to prevent automated account harvesting • Captcha is a computer generated puzzle, i.e. a distorted image of a number/character sequence • User has to type in the number/character sequence • Most humans can read the image but current software can’t • Examples: Computer Security Management Page 4
  • 5. Captchas (2) • Sequence: System request "squestra" authenticated • Problems: – Blind or visually impaired users? – Mobile devices with limited hardware capabilities? Computer Security Management Page 5
  • 6. How to crack Captchas • Human operators (“Sweatshop”) • Forward captcha from original site onto attackers web site and let users unwittingly solve the puzzle! (in real time) Attacker's System web site request to logon to Attacker's 'free' site request to logon to 'protected' site "squestra" "squestra" authenticated authenticated Computer Security Management Page 6
  • 7. Graphical authentication • Human memory for images is better than for words • New approach: graphical (image based) authentication • Graphical passwords – Recognition based – User to select picture among a set of distractors – Example: PassFaces • Position based passwords – Click on right region on an image (challenge) – Chose the correct pattern – Example: GrIDsure Computer Security Management Page 7
  • 8. Password recovery • Passwords are often forgotten – Infrequent use – Forced change (due to password policy) – etc • Password (credential) needs to be recovered • Easy option: send me a new (or my old) password via email • Not really secure! • Need for authentication • Better option: challenge-response based recovery Computer Security Management Page 8
  • 9. Credential recovery • User-triggered process to reset forgotten passwords • Uses knowledge-based authentication • Two varieties – Answering enrolled challenges – Recovery without enrolment Computer Security Management Page 9
  • 10. Recovery with enrolment • Users enrol set of challenges and responses • On re-set they have to prove their identity by answering challenges • Issues – Which challenge-responses should be used? – Who chooses them? Computer Security Management Page 10
  • 11. Recovery without enrolment • Probing knowledge shared between system and user: – Probing recent interactions with the system, e.g. “what was last transaction?” – Personal history, e.g. calendar entries – Recognition of items user should be familiar with, e.g. own photo from a set of mixed ones Computer Security Management Page 11
  • 12. Security aspects of challenge-response pairs • Guessing difficulty – low expectation for a successful guess within a small number of attempts – answer should come from a uniform distribution – is this realistic? • Observation difficulty – it should be difficult for an attacker to retrieve or observe the answer – answers should not be available from public sources, e.g. social networking websites – observation difficulty will differ for individuals, e.g. family, friends, colleagues or strangers • Capture difficulty – Covert recording of answers – How many recovery attempts does an attacker have to observe in order to launch a successful attack? Computer Security Management Page 12
  • 13. Questions • Fixed – Administrator-chosen to Prevents choice of poor questions • Open – User-chosen personally memorable content • Controlled – Fixed set of questions but user can select and modify – Often combined with hints Computer Security Management Page 13
  • 14. Answers • Fixed – User chooses one answer from a set – Common answers need to be barred! • Open – Free form text • Controlled – User-modified answer – Format of answer is controlled Computer Security Management Page 14
  • 15. Challenge-response pairs • Fixed-controlled • Fixed-open • Controlled-fixed Computer Security Management Page 15
  • 16. Comments • Credential recovery systems need to be carefully planned and designed • Infrequent usage – mechanism should be forgiving – users may remember cues, but not details (e. g. word but not upper/lower case) • Consider cost of setting up and maintaining system • Currently text-based, but could involve photos or music • Can be combined with other techniques, e.g. captchas Computer Security Management Page 16