Page 198 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 198

Information  Security and Privacy




                    Notes          you ask and what marketing material you are reading. Used to authenticate users to domains,
                                   systems, and networks, smart cards offer two-factor authentication — something a user has, and
                                   something a user knows. The card is what the user has, and the personal identification number
                                   is what the person knows.
                                   A smart card can process, as well as store, data through its microprocessor; therefore, the smart
                                   card itself (as opposed to the reader/writer device), can control access to the information stored
                                   on the card. This can be especially useful for applications such as user authentication in which
                                   security of the information must be maintained. The smart card can actually perform the password
                                   or PIN comparisons inside the card.

                                   As  an authentication  method, the  smart card is something  the user possesses. With  recent
                                   advances, a password or PIN (something a user knows) can be added for additional security and
                                   a fingerprint or photo (something the user is) for even further security.  As contrasted with
                                   memory cards, an important and useful feature of a smart card is that it can be manufactured to
                                   ensure the security of its own memory, thus reducing the risk of lost or stolen cards.
                                   The smart card can replace conventional password security with something better, a PIN, which
                                   is verified by the card versus the computer system, which may not have as sophisticated a means
                                   for user identification and authentication.
                                   The card can be programmed to limit the number of login attempts as well as ask biographic
                                   questions, or make a biometric check to ensure that only the smart card’s owner can use it. In
                                   addition, non-repeating challenges can be used to foil a scenario in which an attacker tries to
                                   login using a password or PIN he observed from a previous login. In addition, the complexity
                                   of smart card manufacturing makes forgery of the card’s contents virtually impossible.
                                   Use of smart devices means the added expense of the card itself, as well as the special reader
                                   devices. Careful decisions as to what systems warrant the use of a smart card must be made. The
                                   cost of manufacturing smart cards is higher than that of memory cards but the disparity will get
                                   less and less as more and more manufacturers switch to this technology. On the other hand, it
                                   should be remembered that smart cards, as opposed to memory only cards, can effectively
                                   communicate with relatively ‘dumb’, inexpensive reader devices.





                                     Notes  The proper management and administration of smart cards will be a more difficult
                                     task  than  with  typical  password  administration.  It  is  extremely  important  that
                                     responsibilities and procedures for smart card administration be carefully implemented.
                                     Smart card issuance can be easily achieved in a distributed fashion, which is well suited to
                                     a large organizational environment.


                                       !
                                     Caution  Just as with password systems, care should be taken to implement consistent
                                     procedures across all involved systems.





                                      Task  Explain the process of smart card as an authentication method.









          192                               LOVELY PROFESSIONAL UNIVERSITY
   193   194   195   196   197   198   199   200   201   202   203