| 
                           
                              | 
                                       Ravi Sandhu
                                          | Chapter 16 – | Identification and Authentication |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 16.1 |  | Introduction |  
                                          |  | 16.2 |  | Four Principles of Authentication |  
                                          |  | 16.2.1 |  | What You Know |  
                                          |  | 16.2.2 |  | What You Have |  
                                          |  | 16.2.3 |  | What You Are |  
                                          |  | 16.2.4 |  | What You Do |  
                                          |  | 16.3 |  | Password-based Authentication |  
                                          |  | 16.3.1 |  | Access to User Passwords by System Administrators |  
                                          |  | 16.3.2 |  | Risk of Undetected Theft |  
                                          |  | 16.3.3 |  | Risk of Undetected Sharing |  
                                          |  | 16.3.4 |  | Risk of Weakest Link |  
                                          |  | 16.3.5 |  | Risk of Online Guessing |  
                                          |  | 16.3.6 |  | Risk of Offline Dictionary Attacks |  
                                          |  | 16.3.7 |  | Risk of Password Replay |  
                                          |  | 16.3.8 |  | Risk of Server Spoofing |  
                                          |  | 16.3.9 |  | Risk of Pas[s]word Reuse |  
                                          |  | 16.4 |  | Token-based Authentication |  
                                          |  | 16.4.1 |  | One-Time Password Generators |  
                                          |  | 16.4.2 |  | Smart Cards and Dongles |  
                                          |  | 16.4.3 |  | Soft Tokens |  
                                          |  | 16.5 |  | Biometric Authentication |  
                                          |  | 16.5.1 |  | Binding Biometrics to a Known Identity |  
                                          |  | 16.5.2 |  | Input of Biometric Data |  
                                          |  | 16.5.3 |  | Power of Discrimination |  
                                          |  | 16.5.4 |  | Loss of Biometric Identifier |  
                                          |  | 16.5.5 |  | Security of Templates |  
                                          |  | 16.5.6 |  | Privacy Concerns |  
                                          |  | 16.6 |  | Concluding Remarks |  
                                          |  | 16.7 |  | Summary |  
                                          |  | 16.8 |  | For Further Reading |  
 |  | 
                  
                     |  |