Authentic basic concept
- A major security problem for operating system is the authentication problem.
- The protection system depends on an ability to identify the programs and processes that are executing.
- This ability in turn, eventually rests on our power to identify each user of the system.
- A user normally identifies himself.
- Generally, authentication is base on some combination of three set of items: user possession (a key or card), user knowledge (a user identifier and password), and a user attribute ( finger print, retina pattern, or signature).
- The most common approach to authenticating a user identity is the use of user passwords.
- When the user identifies herself by user id or account name, she is asked for a password.
- If the user supplied password, matches the password stored in the system, the system assume that the user is legitimate.
1. Password
- Passwords are often used to protect object in the computer system, in the absence of more complete protection scheme.
- They can be considered a special case of either keys or capabilities.
- For instance, a password could be associate with each resource such as file.
- Whenever a request is made to use the resource, the password must be given.
- If the password is correct, access is granted. Different passwords may be associated with different access rights.
- For example, different password may be used for reading, appending and updating a file.
- Although there are some problems associated with the use of password, they are nevertheless extremely common, because they are easy to understand and use.
- The problems with passwords are related to the difficulty of keeping a password secret.
- Password can be compromise by being guessed, accidentally exposed, or illegally transferred from an authorized user to an unauthorized one.
2. Artifact
- A completely different approach to authorization is to check to see if the user has some item, normally a plastic card with a magnetic stripe on it.
- The card is inserted into the terminal, which then checks to see whose card it is.
- This method can be combined with a password, so a user can only log in if he
1. has the card
2. knows the password
- Automated cash dispensing machine usually work this way.
- Another technique is signature analysis.
- The user sign his name with a special pen connected to the terminal and the computer compares it to a known specimen stored online.
- Even better is not to compare the signature, but compare the pen motion made while writing it.
- A good forger may be able to copy the signature, but will not have a clue as to the exact order in which the stroke were made.
3. Biometric Technique
- Yet another approach is to measure physical characteristic that are hard to forge.
- For example a finger print or a voiceprint reader in the terminal could verify the users identity (it make the search go faster if the user tells the computer who he is, rather then making the computer compare the given fingerprint to the entire database).
- Finger length analysis is surprisingly practical.
- When this is used each terminal has a device.
- The user inserts his hand into it and the length of all his finger is measured and check against the database.