Page 197 - DCAP403_Operating System
P. 197

Operating System




                    Notes          time and effort. If passwords are used, it is recommended that mixed-case passwords with both
                                   numeric and alphabet characters are used, since these types of passwords are more diffi cult for
                                   password cracking tools to crack. Passwords with names and real words in them are easiest to
                                   crack. Good password choices look like this:
                                          1bHkL0m8
                                          a9T4j7uU
                                          7VbbsT10
                                          gL4lJT3m

                                          koO521qW
                                   Poor password choices look like this:
                                          Billsmith
                                          Troutfi shing

                                          Jessica
                                          NewYorkOffi ce
                                          Surfdude
                                   While stronger access control systems are clearly available, password models are not going to go
                                   away anytime soon. Some organizations routinely run password crackers on end-user accounts
                                   to check if end-users are using easy to guess passwords, or more secure password choices. As
                                   long as passwords are being used, they should be managed through routine audits, and expired
                                   according to a pre-determined schedule.

                                   10.5.2 Memory Card

                                   There is a very wide variety of memory card systems with applications for user identifi cation and
                                   authentication. Such systems authenticate a user’s identity based on a unique card, i.e., something
                                   the user possesses, sometimes in conjunction with a PIN (Personal Identifi cation Number), i.e.,
                                   something a user knows.

                                   The use of a physical object or token, in this case a card, has prompted memory card systems to
                                   be referred to as token systems. Other examples of token systems are optical storage cards and
                                   Integrated Circuit (IC) keys.
                                   Memory cards store, but do not process, information. Special reader/writer devices control the
                                   writing and reading of data to and from the cards. The most common type of memory card is a
                                   magnetic stripe card.


                                   These cards use a film of magnetic material, similar or identical to audio and computer magnetic

                                   tape and disk equipment, in which a thin strip, or stripe, of magnetic material affixed to the
                                   surface of a card. A magnetic stripe card is inexpensive, easy to produce and has a high storage
                                   capacity.
                                   The most common forms of a memory card are the telephone calling card, credit card, and ATM
                                   card. The number on a telephone calling card serves as both identification and authentication for

                                   the user of a long distance carrier and so must remain secret.
                                   The card can be used directly in phones that read cards or the number may be entered manually
                                   in a touch tone phone or verbally to an operator. Possession of the card or knowledge of the

                                   number is sufficient to authenticate the user.

                                   Possession of a credit card, specifically the card holder’s name, card number and expiration date,

                                   is sufficient for both identification and authentication for purchases made over the telephone.


          190                              LOVELY PROFESSIONAL UNIVERSITY
   192   193   194   195   196   197   198   199   200   201   202