SlideShare a Scribd company logo
Electronic Authentication
More Than Just a Password
Nicholas Davis, CISSP, CISA
Email: ndavis1@wisc.edu
May 15, 2014
Department Information Services Council
Session Overview
• What electronic authentication is
and why it is important
• Definitions
• Different types of authentication
factors (username/password)
• Benefits and drawbacks of various
authentication technologies
• Strong Authentication
• Question and Answer Session
Presentation Style
• Blue = Topic
• Black = Informational Details
• Red = Discussion
• Audience participation is
encouraged. Anytime you see red,
you can begin to think about the
discussion topic at hand
Authentication Defined
Authentication is the process of providing
proof to a person or system that you are
indeed who you claim to be.
Can you think of some examples?
Electronic authentication is similar in that
provides a level of assurance as to
whether someone or something is who or
what it claims to be in a digital
environment.
Can you think of some examples?
Authentication Factors
• Three types of electronic authentication
• Something you know –
username/password
• Something you have – One time
password device
• Something you are – Voiceprint or
retinal scan
• Let’s examine these in detail!
Username and Password
Something that you know
• Sometimes has rules associated
with it, such as length, or has an
expiration date.
• Can you think of some other
password rules?
• Why do you think password rules
are enforced?
Username and Password - Benefits
• Most widely used
electronic authentication
mechanism in the world.
People understand how to
use it.
• Low fixed cost to
implement and virtually no
variable cost
• Fairly good for low
assurance applications
• No physical device
required
Username and Password - Drawbacks
• Can be easily shared
on purpose
• Can be easily stolen
via Shoulder Surfing,
Keyboard Logger
Packet Sniffer
• Can be guessed
• Can be hard to
remember
• Password code is
easy to hack
Keylogger
Make Your Passwords Strong
• Be as long as possible (never shorter than 8
characters, should be at least 10, 12 is better).
• Include mixed-case letters, if possible.
• Include digits and punctuation marks, if possible.
• Not be based on any personal information.
• Not be based on any dictionary word, in any
language.
• Expire on a regular basis and may not be reused
• May not contain any portion of your name,
birthday, address or other publicly available
information
• May not be easily guessed
• What do you think is the most popular PIN?
One Time Password (OTP) Devices
Something That You Have
• Have an assigned
serial number which
is tied to my userid
• Device generates a
new password every
30 seconds
• Server on other end
knows what to expect
from the device
assigned to me, at
any point in time
One Time Password Device - Benefits
• Difficult to share
• Constantly changing password means it
can’t be stolen, shoulder surfed or sniffed
• Coolness factor!
• Let’s try to circumvent the technology!
• What would happen if I generated a one
time pass code, wrote it down and then
tried to use it later?
One Time Passwords - Drawbacks
• Cost!
• Rank very low on
the washability
index
• Uncomfortable
• Expiration
• Battery Life
• Can be forgotten
at home
Biometrics
Something That You Are
• Use a unique part
of your body to
authenticate you,
such as your voice
pattern, your
retina, or your
fingerprint
Biometrics Benefits
• Harder to steal than even a One
Time Password since it is part of the
user, not simply in their possession
like and OTP device
• Absolute uniqueness of
authentication factor
• Coolness factor
Biometrics Drawbacks
• Cost
• Complexity of
Administration
• Highly invasive
• Not always
reliable – false
negatives
• Not foolproof
• Quick story
Single Factor vs. Multifactor vs Dual
Factor
• Single Factor – Using one method to
authenticate.
• Dual Factor – Using two different types of
authentication mechanism to authenticate
• Multifactor – Using multiple forms of the
same factor. (Password + identifying an
image that only you would know)
• Some people claim multi factor is just a
way around industry regulations. Good
test is to ask, could I memorize both of
these?
Key Concepts
• Current online password based
authentication techniques are weak at
best: Most rely on multiple single factors
• Password Credentials are easily stolen
from consumers, and rarely change
• Lack of consistency in authentication
processes confuse consumers
Summary
• There are three types of
authentication technologies:
– Something you know
– Something you have
– Something you are
Password is the weakest
Biometrics is the strongest
Audience Discussion and
Q&A
• Describe which types
of authentication
technologies are
incorporated into your
ATM card
• How do you feel
about the use of
biometrics?
• Name a situation in
which you think
biometrics should be
used for
authentication
Dual Factor Authentication
At UW-Madison
• Many of our systems contain
“sensitive” information. For
purposes of discussion, “sensitive” =
information which we do not want to
be accessed by the general public
• Three large systems come to mind:
• HRS, SFS, and ISIS
Dual Factor Rollout
• Internal desire for best practices
• Audit findings
• HRS, across all UW-System
• 2000 users
• Now going live on SFS
• Other systems may follow
• What this means for you
We Use Symantec’s VIP
• Hard tokens
• Soft tokens
• Serial number bound to username
Concerns
• Forgot token at home
• Drove over token
• Accidently dropped token in
bathroom
• Shared token with my BFF (Best
Friend Forever)
• Battery died
• Support system
Dual Factor Authentication
The Most Important Slide
Q&A Session
• If you have questions, comments,
concerns, suggestions, contact:
• Nicholas Davis
• Email ndavis1@wisc.edu
• http://facebook.com/nicholas.a.davis

More Related Content

PPTX
Two factor authentication presentation mcit
PPTX
Two factor authentication.pptx
PPTX
Two Factor Authentication
PDF
3 reasons your business can't ignore Two-Factor Authentication
PPT
Biometric encryption
PPT
3D Password Presentation
PDF
What is two factor or multi-factor authentication
PPSX
Brute force attack
Two factor authentication presentation mcit
Two factor authentication.pptx
Two Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
Biometric encryption
3D Password Presentation
What is two factor or multi-factor authentication
Brute force attack

What's hot (20)

PPTX
Password cracking and brute force
PPTX
Password Policy and Account Lockout Policies
PPTX
Basic Security Training for End Users
PPTX
Graphical Password Authentication
PDF
Why upgrade your MFA to Adaptive Authentication?
PDF
User Authentication: Passwords and Beyond
PPTX
Cybersecurity Awareness Overview.pptx
PPT
Digital Signature
PPTX
Seminar-Two Factor Authentication
PDF
A Guide to Multi Factor Authentication
PPT
3 d password
PPTX
User authentication
 
PPTX
Digital signature
PPTX
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
PPT
Information security
PPTX
Multifactor Authentication
PPTX
2FA Protocol Presentation
PPTX
Digital certificates
PDF
Cybersecurity Awareness Training Presentation v2024.03
PPT
End User Security Awareness - Information Security
Password cracking and brute force
Password Policy and Account Lockout Policies
Basic Security Training for End Users
Graphical Password Authentication
Why upgrade your MFA to Adaptive Authentication?
User Authentication: Passwords and Beyond
Cybersecurity Awareness Overview.pptx
Digital Signature
Seminar-Two Factor Authentication
A Guide to Multi Factor Authentication
3 d password
User authentication
 
Digital signature
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Information security
Multifactor Authentication
2FA Protocol Presentation
Digital certificates
Cybersecurity Awareness Training Presentation v2024.03
End User Security Awareness - Information Security
Ad

Similar to Electronic Authentication, More Than Just a Password (20)

PPT
Electronic authentication more than just a password
PPT
Electronic Authentication More Than Just A Password
PPT
Authenticationtechnologies 120711134100-phpapp01
PDF
Two-factor authentication- A sample writing _Zaman
PPT
Authentication Technologies
PPT
Authentication technologies
PDF
Class paper final
PDF
Making User Authentication More Usable
PDF
information security Lecture by cyber security
PDF
Two factor authentication
PDF
Two factor authentication
DOCX
Biometric Authentication Technology - Report
PDF
UNIT 2 Information Security Sharad Institute
PPTX
3d password
PDF
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
PDF
Twg 04-04
PDF
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
PPTX
Unit-4-User-Authentication.pptx
PDF
2020-08_The_Evolution_of_Authentication.pdf
Electronic authentication more than just a password
Electronic Authentication More Than Just A Password
Authenticationtechnologies 120711134100-phpapp01
Two-factor authentication- A sample writing _Zaman
Authentication Technologies
Authentication technologies
Class paper final
Making User Authentication More Usable
information security Lecture by cyber security
Two factor authentication
Two factor authentication
Biometric Authentication Technology - Report
UNIT 2 Information Security Sharad Institute
3d password
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Twg 04-04
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
Marcos de Pedro Neoris authenware_cybersecurity step1
Unit-4-User-Authentication.pptx
2020-08_The_Evolution_of_Authentication.pdf
Ad

More from Nicholas Davis (20)

PPTX
Conducting a NIST Cybersecurity Framework (CSF) Assessment
PPTX
Top Cybersecurity Challenges Facing Your Business
PPTX
UW-Madison, Information Systems 371 - Decision Support Systems
PPTX
Lecture blockchain
PPTX
Software Development Methodologies
PPTX
Information systems 365 - Cloud and BYOD Security
PPTX
Information Security Awareness: at Work, at Home, and For Your Kids
PPTX
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
PPTX
Information Systems 371 -The Internet of Things Overview
PPTX
Cyberwar Gets Personal
PPTX
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
PPT
Bringing the Entire Information Security Semester Together With a Team Project
PPT
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
PPTX
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
PPTX
Information Security Fall Semester 2016 - Course Wrap Up Summary
PPTX
Organizational Phishing Education
PPT
Security Operations -- An Overview
PPT
Network Design, Common Network Terminology and Security Implications
PPT
Survey Presentation About Application Security
PPT
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Top Cybersecurity Challenges Facing Your Business
UW-Madison, Information Systems 371 - Decision Support Systems
Lecture blockchain
Software Development Methodologies
Information systems 365 - Cloud and BYOD Security
Information Security Awareness: at Work, at Home, and For Your Kids
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 371 -The Internet of Things Overview
Cyberwar Gets Personal
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
Bringing the Entire Information Security Semester Together With a Team Project
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Information Security Fall Semester 2016 - Course Wrap Up Summary
Organizational Phishing Education
Security Operations -- An Overview
Network Design, Common Network Terminology and Security Implications
Survey Presentation About Application Security
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...

Recently uploaded (20)

PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPT
tcp ip networks nd ip layering assotred slides
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
Funds Management Learning Material for Beg
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
artificial intelligence overview of it and more
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
The New Creative Director: How AI Tools for Social Media Content Creation Are...
522797556-Unit-2-Temperature-measurement-1-1.pptx
tcp ip networks nd ip layering assotred slides
international classification of diseases ICD-10 review PPT.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
Paper PDF World Game (s) Great Redesign.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
QR Codes Qr codecodecodecodecocodedecodecode
Job_Card_System_Styled_lorem_ipsum_.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
Funds Management Learning Material for Beg
presentation_pfe-universite-molay-seltan.pptx
WebRTC in SignalWire - troubleshooting media negotiation
introduction about ICD -10 & ICD-11 ppt.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Sims 4 Historia para lo sims 4 para jugar
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
artificial intelligence overview of it and more
Design_with_Watersergyerge45hrbgre4top (1).ppt

Electronic Authentication, More Than Just a Password

  • 1. Electronic Authentication More Than Just a Password Nicholas Davis, CISSP, CISA Email: ndavis1@wisc.edu May 15, 2014 Department Information Services Council
  • 2. Session Overview • What electronic authentication is and why it is important • Definitions • Different types of authentication factors (username/password) • Benefits and drawbacks of various authentication technologies • Strong Authentication • Question and Answer Session
  • 3. Presentation Style • Blue = Topic • Black = Informational Details • Red = Discussion • Audience participation is encouraged. Anytime you see red, you can begin to think about the discussion topic at hand
  • 4. Authentication Defined Authentication is the process of providing proof to a person or system that you are indeed who you claim to be. Can you think of some examples? Electronic authentication is similar in that provides a level of assurance as to whether someone or something is who or what it claims to be in a digital environment. Can you think of some examples?
  • 5. Authentication Factors • Three types of electronic authentication • Something you know – username/password • Something you have – One time password device • Something you are – Voiceprint or retinal scan • Let’s examine these in detail!
  • 6. Username and Password Something that you know • Sometimes has rules associated with it, such as length, or has an expiration date. • Can you think of some other password rules? • Why do you think password rules are enforced?
  • 7. Username and Password - Benefits • Most widely used electronic authentication mechanism in the world. People understand how to use it. • Low fixed cost to implement and virtually no variable cost • Fairly good for low assurance applications • No physical device required
  • 8. Username and Password - Drawbacks • Can be easily shared on purpose • Can be easily stolen via Shoulder Surfing, Keyboard Logger Packet Sniffer • Can be guessed • Can be hard to remember • Password code is easy to hack
  • 10. Make Your Passwords Strong • Be as long as possible (never shorter than 8 characters, should be at least 10, 12 is better). • Include mixed-case letters, if possible. • Include digits and punctuation marks, if possible. • Not be based on any personal information. • Not be based on any dictionary word, in any language. • Expire on a regular basis and may not be reused • May not contain any portion of your name, birthday, address or other publicly available information • May not be easily guessed • What do you think is the most popular PIN?
  • 11. One Time Password (OTP) Devices Something That You Have • Have an assigned serial number which is tied to my userid • Device generates a new password every 30 seconds • Server on other end knows what to expect from the device assigned to me, at any point in time
  • 12. One Time Password Device - Benefits • Difficult to share • Constantly changing password means it can’t be stolen, shoulder surfed or sniffed • Coolness factor! • Let’s try to circumvent the technology! • What would happen if I generated a one time pass code, wrote it down and then tried to use it later?
  • 13. One Time Passwords - Drawbacks • Cost! • Rank very low on the washability index • Uncomfortable • Expiration • Battery Life • Can be forgotten at home
  • 14. Biometrics Something That You Are • Use a unique part of your body to authenticate you, such as your voice pattern, your retina, or your fingerprint
  • 15. Biometrics Benefits • Harder to steal than even a One Time Password since it is part of the user, not simply in their possession like and OTP device • Absolute uniqueness of authentication factor • Coolness factor
  • 16. Biometrics Drawbacks • Cost • Complexity of Administration • Highly invasive • Not always reliable – false negatives • Not foolproof • Quick story
  • 17. Single Factor vs. Multifactor vs Dual Factor • Single Factor – Using one method to authenticate. • Dual Factor – Using two different types of authentication mechanism to authenticate • Multifactor – Using multiple forms of the same factor. (Password + identifying an image that only you would know) • Some people claim multi factor is just a way around industry regulations. Good test is to ask, could I memorize both of these?
  • 18. Key Concepts • Current online password based authentication techniques are weak at best: Most rely on multiple single factors • Password Credentials are easily stolen from consumers, and rarely change • Lack of consistency in authentication processes confuse consumers
  • 19. Summary • There are three types of authentication technologies: – Something you know – Something you have – Something you are Password is the weakest Biometrics is the strongest
  • 20. Audience Discussion and Q&A • Describe which types of authentication technologies are incorporated into your ATM card • How do you feel about the use of biometrics? • Name a situation in which you think biometrics should be used for authentication
  • 21. Dual Factor Authentication At UW-Madison • Many of our systems contain “sensitive” information. For purposes of discussion, “sensitive” = information which we do not want to be accessed by the general public • Three large systems come to mind: • HRS, SFS, and ISIS
  • 22. Dual Factor Rollout • Internal desire for best practices • Audit findings • HRS, across all UW-System • 2000 users • Now going live on SFS • Other systems may follow • What this means for you
  • 23. We Use Symantec’s VIP • Hard tokens • Soft tokens • Serial number bound to username
  • 24. Concerns • Forgot token at home • Drove over token • Accidently dropped token in bathroom • Shared token with my BFF (Best Friend Forever) • Battery died • Support system
  • 25. Dual Factor Authentication The Most Important Slide
  • 26. Q&A Session • If you have questions, comments, concerns, suggestions, contact: • Nicholas Davis • Email ndavis1@wisc.edu • http://facebook.com/nicholas.a.davis