430 likes | 507 Views
The Practicality of Changing Default Authentication Mechanisms: Applied in a Workstation Environment. Shawn Williams. Question?. The Problem. Is a World without Passwords Possible?. Agenda and Topics Covered. Purpose of this Study Where Did the Data Come from
E N D
The Practicality of Changing Default Authentication Mechanisms: Applied in a Workstation Environment Shawn Williams
Agenda and Topics Covered • Purpose of this Study • Where Did the Data Come from • Why I Choose this Topic for Research • Generality on why Security fails • The Problems with passwords • Benefits of this Research • Criteria used for Evaluating technologies • Technologies that were evaluated • Results and Findings
Purpose of this Study • To explore various authentication systems and see if it is possible for any one of them to be deemed to be able to replace the current password mechanisms used in business environments
Where Did the Data Come from • Taken from mostly secondary sources • The evaluation criteria used for rating various authentication systems was created based on finding and personal knowledge
Personal Motivationfor Choosing this Topic • Personally, I’ve always wondered why password authentication was still the default standard despite the fact that there were many new and more secure systems emerging and because of this, I wanted to find out whether or not it is even practical to replace password authentication with that of something better.
Why Do Security Systems Fail? • Design model • User model • System model
Why Should we stop using password based security in productivity environments? • There is a problem in finding balance between usability and security • Passwords can easily be told to others • Passwords are easy to copy
Why Should we stop using password based security in productivity environments? • There are many widely available tool of decrypting stored password information • Passwords can be captured easily during input time • There are weaknesses in password reset mechanisms that hackers may be able to exploit
Benefits of this Research • Reduces risk of deploying unfamiliar authentication technologies in which may be more trouble then they are worth • Narrows Down the choices and confusion created with multiple authentication methods • Large and Small business owners no longer need to waste time figuring out what password replacement system is right for them
Evaluation Criteria Categories • Number of security holes • Cost • Ease of Use • Increase in Security • Scalability • Practicality of implementation and modding • Access and availability (how easy is it to obtain)
Generalized Scores • High • Medium • Low
Number of Exploitable Security Holes (High) • Score Range 0-3 • Number of security holes exceed the threshold of what could be considered acceptable and/or more holes then the password based security we are trying to replace
Number of Exploitable Security Holes (Medium) • Score Range 4-7 • Number of Security holes only marginally improve over number of exploitable password related holes
Number of Exploitable Security Holes (Low) • Score Range 8-10 • Very few exploitable holes and massive improvement over password security
Cost (High) • Score Range 0-3 • High maintenance and installation costs
Cost (Medium) • Score Range 4-7 • Cost of fully installing and maintaining system is either high in maintenance fees or high in installation but not both
Cost (Low) • Score Range 8-10 • Cost of fully installing and maintaining system is minimal
Ease of Use (High) • Score Range 8-10 • System is so complicating that most users will attempt to bypass it in order to speed up work production
Ease of Use (Medium) • Score Range 4-7 • System has a medium level of complexity that can be tolerated by most users
Ease of Use (Low) • Score Range 0-3 • Daily usage of security mechanism is easy to use by most users with business level computer skills
Practicality (High) • Score Range 0-3 • The system is complex to troubleshoot if broken and difficult to mod and requires major changes to in fracture to use
Practicality (Medium) • Score Range 4-7 • System has a medium level of setup complexity and can be workable with effort. Small change to existing in fracture may be required
Practicality (Low) • Score Range 8-10 • System is flexible, easy to install with current technologies and quick to set up. No change to infrastructure mainly out of the box solution
Scalability (High) • Score Range 8-10 • System is highly flexible and can be implemented with ease on networks of any size
Scalability (Medium) • Score Range 4-7 • System has a workable level of flexibility but generally can’t handle extremes
Scalability (Low) • Score Range 0-3 • System is only meant to be installed on network size it supports and either does not provide room for growth or too elaborate to be practical on smaller systems
Increase Security (High) • Score Range 8-10 • System is much more secure then password authentication
Increase Security (Medium) • Score Range 4-7 • System provides some security advantages over password security
Increased Security (Low) • Score Range 0-3 • System provide little or no security advantage over password security
Access and Availability (High) • Score Range 8-10 • Found in any office or computer store
Access and Availability (Medium) • Score Range 4-7 • Implementation exists but special orders need to be made
Access and Availability (Low) • Score Range 0-3 • Only exists in theory or is a prototype so development overhead is need to make the solution
Technologies that were Evaluated • Two Types of Graphical Passwords • Passfaces • Click-Based Graphical Password (Clickpoints)
Technologies that were Evaluated • Four Kinds Biometrics • Finger Print Recognition (optical, capacitance, ultrasonic) • Face Recognition • Retina Scan • Typing Rhythem
Technologies that were Evaluated • Three Kinds of Tokens • Disconnected Tokens • Connected Tokens (USB, SmartCard) • Contactless Tokens (Bluetooth, RFID)
What Do the Scores mean? • The ranking system is out of 70, 10 points for each of the 7 categories • Only systems with a score of 53/70 or higher will be considered a good password replacement • 53/70 = 75%
Findings • None of the systems even hit close to 70/70 • Scores that made it just bearly hit the min requirement of 53 points • These borderline results paint a picture why wide scale adoptation of higher level authentication has not taken off a quickly is it should of dispite the fact nearly all systems offer improved security over passwords
Results • Graphical passwords (Passfaces) = 55pts • Biometrics (Finger Print Recognition) = 53.5pts • Disconnected Tokens = 58pts • Connected Tokens = 56.5pts
More Results and Findings • You can download the full report in my Blog @ • https://swillia5.wordpress.com