Page 71 - DCAP516_COMPUTER_SECURITY
P. 71

Unit 6: User Authentication




               Kerberos V5 is used for authentication if a password is used to log on to a domain account.  Notes
               Kerberos V5 authentication with certificates is used if a smart card is used instead.
          2.   With a local computer account, a user logs on to a local computer by using credentials
               stored in the Security Accounts Manager (SAM), which is the local security account database.
               Any workstation or member server can store local user accounts.

          6.4.2 Network Authentication Process

          Network authentication confirms the user’s identification to any network service that the user is
          attempting to access. To provide this type of authentication, many mechanisms are supported,
          including Kerberos V5, Secure Socket Layer/Transport Layer Security (SSL/TLS), and, for
          compatibility with Windows NT 4.0, LAN Manager.
          Users who use a domain account do not see network authentication. Users who use a local
          computer account must provide credentials (such as a user name and password) every time they
          access a network resource. By using the domain account, the user has credentials that are
          automatically used for single sign-on.

          6.5 Authentication in E-commerce

          The consumer need for authentication relates to building trust, that is, the need to build a
          transacting trust environment equivalent to that of the physical marketplace, where the shop
          location, the appearance of goods and personnel, and the possibility to touch and feel the goods,
          etc., inspire trust. The consumer need for authentication also includes the need to identify the
          entity towards which to address an eventual complaint.
          In the virtual market place, merchant authentication is a building block for this trust building
          process. However, additional tools are also required such as: a contractual framework, trust
          marks, codes of conduct, data privacy statements, dispute resolution procedures, clear
          information on terms and conditions, clear pricing offer, customer service, graphical design
          of the website, etc.

          The merchant need for authentication derives from the need for a payment guarantee. The exact
          authentication methods and authorization processes used to obtain this guarantee depend on
          the payment instrument used, which in turn is defined by the issuer in relation to the business
          risks associated to this instrument.
          The authentication can be carried out through different complementary steps: the authentication
          or validation of the payment instrument and its rights to be used for payment in the transaction
          environment and the authentication of the consumer as the entitled owner of the payment
          instrument.
          Additional steps may be required by the payment instrument in order to obtain payment
          guarantee such as the request for an online authorization to the issuer. For example, an e-purse
          would only require authentication of payment instrument and verification of its balance, while
          the use of a debit card could require cardholder authentication with a PIN, and an online
          authorization request to the issuer to authenticate the card and verify the funds’ availability.

          6.6 Economics of Strong user Authentication

          Strong user authentication is costly and off-putting because no user authentication method is
          secure when employed alone. Experts agree that real information security requires a combination
          of tests (multi-factor user authentication) to verify who the user is, what the user knows, what





                                           LOVELY PROFESSIONAL UNIVERSITY                                   65
   66   67   68   69   70   71   72   73   74   75   76