Browse Source

Finished lab1

master
Martins Eglitis 8 months ago
parent
commit
963f85d170
2 changed files with 45 additions and 5 deletions
  1. 45
    5
      lab1/Lab1_Group64.lyx
  2. BIN
      lab1/Lab1_Group64.pdf

+ 45
- 5
lab1/Lab1_Group64.lyx View File

@@ -7,7 +7,7 @@
\textclass article
\begin_preamble
% Constants to set once
\newcommand{\hmwkAuthorName}{Lina Blomkvist, Martins Eglitis} % Your name
\newcommand{\hmwkAuthorName}{Group 64: Martins Eglitis} % Your name

% Packages
\usepackage{fancyhdr} % Required for custom headers
@@ -182,6 +182,42 @@ The advantage is that the password is valid only once, which might improve
Task 3
\end_layout

\begin_layout Standard
The 3 authentication generic types are:
\end_layout

\begin_layout Itemize
Knows.
This can be implemented by using passwords or PIN codes.
The advantage is that you don't have to carry a physical object with you.
However, it is harder to detect intrusion with this generic type.
\end_layout

\begin_layout Itemize
Have.
This can be implemented by using physical objects, for example, USB flash
drives, NFC cards, etc.
The advantage is that you don't have to remember anything but the downside
is that the physical object can be stolen, lost, etc.
\end_layout

\begin_layout Itemize
Are.
It is very similar to
\begin_inset Quotes eld
\end_inset

have
\begin_inset Quotes erd
\end_inset

but related to one's body.
It can be implemented using fingerprints, retina, blood, etc.
It might be harder for attacker to breach directly but the methods for
evaluating the identity have to be very advanced not to misinterpret since
they usually rely on probability.
\end_layout

\begin_layout Subsubsection*
Task 4
\end_layout
@@ -217,6 +253,14 @@ Password.
Task 5
\end_layout

\begin_layout Standard
The purpose of doing that is to provide enough evidence for the user that
the system is legitimately the one he has chosen to authenticate against.
For example, when connecting to a SSH server you are provided with the
key in order to make sure you're connecting to the correct server and not
the attacker's server.
\end_layout

\begin_layout Subsubsection*
Task 6
\end_layout
@@ -447,10 +491,6 @@ Success
\end_inset


\begin_inset Newpage pagebreak
\end_inset


\end_layout

\begin_layout Subsubsection*

BIN
lab1/Lab1_Group64.pdf View File


Loading…
Cancel
Save