Brain Dump

Authentication

Tags
security

Verifying the validity of something (usually the id claimed by a system entity).

Widely used [see page 17, mechanisms] for authentication are:

MechanismExampleVulnerabilities
Something you [see page 18, know]Password, PINShort length can be guessed, phishing, and users can forget passwords
Something you [see page 20, have]Smart-card, 1-time-password-generatorIf you lose the hardware you lose the ability to authenticate yourself
Something you [see page 21, are]BiometricsBiometrics can change overtime (eg. scarring), be tricked and stolen
Your locationCurrent building, proximity to an object

Note: One time password generators are slowly being replaced with soft tokens.