《网络安全 Network Security》教学资源(PPT讲稿)Topic 3 User Authentication

Network Security Topic 3: User Authentication
Network Security Topic 3: User Authentication Topic 3: User Authentication 12/3/2021

Reading for this Lecture Wikipedia Password Password strengt KEEP Salt_(cryptography) Password cracking CALMI Trusted path AND One time password LOVE READINGa)
Reading for this Lecture • Password • Password strength • Salt_(cryptography) • Password cracking • Trusted path • One time password Topic 3: User Authentication 22/3/2021

Important Takeaway Message Thinking about security is to consider and weigh in different trade-offs Understanding and proper usages of some basic terminologies are Important
Important Takeaway Message Thinking about security is to consider and weigh in different trade-offs Understanding and proper usages of some basic terminologies are important Topic 3: User Authentication 32/3/2021

Three as of information Security Authentication VS Access Control VS Audit
Three A’s of Information Security Authentication vs. Access Control vs. Audit Topic 3: User Authentication 42/3/2021

Authentication, Authorization and audit Authentication It is the process of determining whether somebody is who he/she is claiming to bei Access control It is the process of determining whether an action is allowed with respect to some well defined rules or policies Audit Record everything to identify attackers after the fact
Authentication, Authorization, and Audit • Authentication • It is the process of determining whether somebody is who he/she is claiming to be • Access control • It is the process of determining whether an action is allowed with respect to some welldefined rules or policies • Audit • Record everything to identify attackers after the fact Topic 3: User Authentication 52/3/2021

Authentication and access control (From Wikipedia) Authentication is the act of establishing or confirming something(or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system
Authentication and Access Control (From Wikipedia) • Authentication is the act of establishing or confirming something (or someone) as authentic, that is, that claims made by or about the subject are true. This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labeling claims to be, or assuring that a computer program is a trusted one • Access control is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system Topic 3: User Authentication 62/3/2021

Why Audit? Do not have enough information during decision making time to make a HOSPITAL judgment whether an access request is valid SPEED It is difficult to weigh in all possible LIMIT conditions of a valid access request 65 Specially relevant when legitimacy of access request depends on contextual information
Why Audit? • Do not have enough information during decision making time to make a judgment whether an access request is valid • It is difficult to weigh in all possible conditions of a valid access request • Specially relevant when legitimacy of access request depends on contextual information Topic 3: User Authentication 72/3/2021

Our concentration today is user authentication
Our concentration today is user authentication Topic 3: User Authentication 82/3/2021

Scenarios Requiring User Authentication Logging into a local computer Logging into a remote computer Logging into a network Accessing websites (A)I am John (B)Yeah, Right. (C)I am John, here is my token (D)OKAY 9
Scenarios Requiring User Authentication • Logging into a local computer • Logging into a remote computer • Logging into a network • Accessing websites (A) I am John (B) Yeah, Right. (C) I am John, here is my token (D) OKAY Topic 3: User Authentication 92/3/2021

Authentication token Based on something the user know EXample: Passphrase, password Based on something the user possesses Example: Smart card or token Based on something the user is Example: Biometric
Authentication Token • Based on something the user know • Example: Passphrase, password • Based on something the user possesses • Example: Smart card or token • Based on something the user is • Example: Biometric Topic 3: User Authentication 102/3/2021
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《数据结构》课程教学资源(PPT课件讲稿)第三章 栈和队列.ppt
- 中国水利水电出版社:《单片机原理及应用》课程PPT教学课件(C语言版)第2章 MCS-51单片机基本结构.ppt
- 电子科技大学:《Unix操作系统基础》课程教学资源(PPT课件)第一章 UNIX操作系统概述、第二章 UNIX使用入门.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第五章 存储器层次结构.ppt
- Data Mining Association Analysis——Basic Concepts and Algorithms Chapter 6 Introduction to Data Mining.ppt
- 《信息安全与管理》课程教学资源(PPT课件讲稿)第六章 公开密钥设施PKI.ppt
- 《计算机应用基础》课程教学资源(PPT课件讲稿)第一章 计算机基础知识.ppt
- 《Computer Networking:A Top Down Approach》英文教材教学资源(PPT课件讲稿,3rd edition)Chapter 5 Link Layer.ppt
- 西安电子科技大学:《微机原理与接口技术》课程教学资源(PPT课件讲稿)第六章 存储器设计.pptx
- 《编译原理》课程教学资源(PPT课件讲稿)第五章 类型检查.ppt
- 《网络搜索和挖掘关键技术 Web Search and Mining》课程教学资源(PPT讲稿)Lecture 10 Query expansion.ppt
- 北京师范大学现代远程教育:《计算机应用基础》课程教学资源(PPT课件讲稿)第一章 计算机常识.ppt
- 中国科学技术大学:《网络信息安全 NETWORK SECURITY》课程教学资源(PPT课件讲稿)UNIX/LINUX 操作系统.ppt
- 哈尔滨工业大学:《语言信息处理》课程教学资源(PPT课件讲稿)机器翻译 I Machine Translation I(主讲:张宇).ppt
- 《操作系统 Operating System》课程教学资源(PPT课件讲稿)概述 Overview.ppt
- 《计算机网络》课程教学大纲(计算机科学与技术、网络工程专业).pdf
- 《计算机组装维修》课程PPT教学课件(实训教程)第3章 主板.ppt
- 山西国际商务职业学院:《数据库应用程序设计》课程教学资源(PPT课件)第7章 VFP6程序设计基础.pps
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第8章 指针.ppt
- 山东大学:《微机原理及单片机接口技术》课程教学资源(PPT课件讲稿)第四章 指令系统及汇编语言程序设计(4.6-4.8).ppt
- 《C++语言基础教程》课程电子教案(PPT教学课件)教学资源(PPT课件)第2讲 C++语言基础.ppt
- 长春大学:《计算机应用基础》课程教学资源(PPT课件讲稿)第二章 操作系统.ppt
- 南京大学:《数据结构 Data Structures》课程教学资源(PPT课件讲稿)第二章 线性表.ppt
- 浪潮公司:并行程序、编译与函数库简介、应用软件的调优.ppt
- 《C程序设计》课程电子教案(PPT课件讲稿)第二章 基本数据类型及运算.ppt
- 安徽理工大学:《汇编语言》课程教学资源(PPT课件讲稿)第四章 汇编语言程序格式.ppt
- 清华大学:《网络安全 Network Security》课程教学资源(PPT课件讲稿)Lecture 01 Introduction.pptx
- 《数据结构》课程教学资源(PPT课件讲稿)第六章 集合与字典.ppt
- 华东理工大学:《Visual Basic程序设计教程》课程教学资源(PPT课件)第四讲 VB语言基础(运算符、函数和表达式).pps
- 《软件工程》课程教学资源(PPT课件讲稿)第4章 软件总体设计.ppt
- 《网络综合布线》课程教学资源(PPT讲稿)模块2 综合布线工程设计.ppt
- 数据库接口技术(PPT讲稿)开放式数据库联接 Open DataBase Connectivity——ODBC.ppt
- 《网络系统集成技术》课程教学资源(PPT课件讲稿)第六章 网络互联技术.ppt
- 清华大学出版社:《网络信息安全技术》教材电子教案(PPT课件讲稿)第2章 密码技术.ppt
- 湖南生物机电职业技术学院:《电子商务概论》课程教学资源(PPT课件)第六章 网上支付.ppt
- 《计算机组装与维修》课程电子教案(PPT教学课件)第一章 计算机系统维护维修基础.ppt
- 《Java Web应用开发基础》课程教学资源(PPT课件)第8章 EL、JSTL和Ajax技术.ppt
- Dynamic Pricing in Spatial Crowdsourcing:A Matching-Based Approach.pptx
- 计算机软件技术基础:《Visual Basic6.0 程序设计》课程教学资源(PPT课件)第1章 Visual Basic(VB)概述.ppt
- 贵州电子信息职业技术学院:常用办公技巧(PPT讲稿,主讲:刘忠华).ppt