Access over 20 million homework & study documents

Threats Of Authenitication.edited

Content type
User Generated
Subject
Research & Summaries
School
Southern New Hampshire University
Type
Homework
Rating
Showing Page:
1/6
1
Threats in Authentication
Students Name
Institution
Course Name
Instructors Name
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
2
Alice and Bob compare a simple form of communication where Alice can be taken as a client
trying to access a server (Bob) through a network. Bob can authenticate Alice in various ways,
which possess various threats as follows.
Alice sends a password, and Bob compares it against a database of passwords.
This is the basic form of authentication, which involves exchanging the use and storage of
password as plain text. Some of the threats exposed to this protocol include eavesdropping
attacks. During the exchange of passwords from Alice to Bob, an eaves-dropping attack or
snooping attack may happen. This type of attack involves the theft of information as it is
transmitted over a network. If the network between Bob and Alice is not secure, the attacker can
initiate a snooping attack and access the shared password. According to Babu, S. A. (2017), this
type of attack can be countered by Bob and Alice's firewall. They can also use packet filtering
and configure routers and firewalls not to accept packets with spoofed addresses. They should
also avoid the use of public networks and instead use VPNs when doing the exchange.
The second threat includes a Replay attack. This can happen when an attacker intercepts
the password being shared and delays the transmission, replays or repeats the password between
Alice and Bob. For this to be prevented, Bob and Alice should perform a regular audit of their
entire systems from time to time to be protected from malware replay attacks (Babu, S. A. 2017).
The use of an intrusion detection system helps in the identification of a security attack whenever
it occurs.
A dictionary attack is another threat that may happen during this transaction. This is a type
of attack where an attacker can try to guess Alice's password. The attacker runs common phrases
and words, trying to guess the password. To prevent this, Alice should implement a strong

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
1 Threats in Authentication Students Name Institution Course Name Instructors Name Date 2 Alice and Bob compare a simple form of communication where Alice can be taken as a client trying to access a server (Bob) through a network. Bob can authenticate Alice in various ways, which possess various threats as follows. Alice sends a password, and Bob compares it against a database of passwords. This is the basic form of authentication, which involves exchanging the use and storage of password as plain text. Some of the threats exposed to this protocol include eavesdropping attacks. During the exchange of passwords from Alice to Bob, an eaves-dropping attack or snooping attack may happen. This type of attack involves the theft of information as it is transmitted over a network. If the network between Bob and Alice is not secure, the attacker can initiate a snooping attack and access the shared password. According to Babu, S. A. (2017), this type of attack can be countered by Bob and Alice's firewall. They can also use packet filtering and configure routers and firewalls not to accept packets with spoofed addresses. They should also avoid the use of public networks and instead use VPNs when doing the exchange. The second threat includes a Replay attack. This can happen when an attacker intercepts the password being shared and delays the transmission, replays or repeats the password between Alice and Bob. For this to be prevented, Bob and Alice should perform a regular audit of ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4