Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication

What will be an ideal response?


Method:
There
are
many
potential
methods
to
defeating
authentication:
password
guessing,
brute-­?force
attacks,
biometric
forgery,
identity
theft,
guessing
answers
to
password
reset
questions,
etc.
Opportunity:
Opportunity
changes
depending
on
a
variety
of
factors,
such
as
how
accessible
the
system
is,
how
it
behaves
when
a
user
fails
to
authenticate
a
number
of
times,
what
types
of
passwords
it
allows,
and
how
the
system
resets
lost
passwords.
Motive:
This
is
typically
something
of
value
the
attacker
might
gain
from
defeating
the
authentication.
Without
a
motive,
an
attacker
would
have
no
reason
to
execute
the
attack
and
certainly
not
to
pour
expensive
resources
into
it.

Computer Science & Information Technology

You might also like to view...

Explain how RPC works.

What will be an ideal response?

Computer Science & Information Technology

"Unlimited use" of stock photography may actually impose a limitation on:

a. the number of units you can distribute without paying more. b. the number of changes you can make to the image. c. converting the image to another file format. d. the filters you may use to alter the image. e. the price you can charge for your product.

Computer Science & Information Technology

One way to display formulas is by pressing this key combination.

A. [CTRL][+] B. [CTRL][`] C. [CTRL][F] D. [CTRL][*]

Computer Science & Information Technology

This function returns today's date.

A. TodayDate B. TodaysDate C. Day D. Now

Computer Science & Information Technology