Identification and Authentication
 Identification:
  - Identification is the process of recognizing and distinguishing users,
    devices, or systems within a network.
  - It is the first step in the security process before authentication and
    authorization.
 Authentication:
  - Authentication is the process of verifying the identity of a user, device,
    or system before granting access to resources.
  - It ensures that the entity claiming an identity is actually who they say
    they are.
                     User name and Password
 User name:
  - A username (also called a user ID, login name, or account name)
    is a unique identifier assigned to a user in a system, network, or online
    platform.
  - It is used for identification during the authentication process.
 Password:
  - A password is a secret combination of characters (letters, numbers,
    symbols) used to verify a user's identity during authentication.
  - It acts as a security key to protect access to accounts, systems, or
    data.
 User name and Password Management:
  1. The first step is called identification
  2. The second step is called authentication.
  3. Entity authentication: The process of verify the identify claimed by
     some system entity.
  4. Password Security Management: Managing password security can
     be little expensive and obtaining a valid password is a common way of
     gaining unauthorized access to a computer system.
                         Password Attacks
Password attack is the process of attempting to gain unauthorized access to
restricted systems using common password or algorithms that guess
passwords. In other words, it is an art of obtaining the correct password that
gives access to a system protected by an authentication method.
Types of Password Attacks:
  1. Piggybacking
  2. Shoulder surfing
  3. Dumpster diving
1. Piggybacking:
  Piggybacking is a type of password attack. Password attack is the process
  of attempting to gain unauthorized access to restricted systems using
  common password or algorithms that guess passwords. In other words, it
  is an art of obtaining the correct password that gives access to a system
  protected by an authentication method.
  Piggybacking is a social engineering attack where an attacker gains an
  unauthorized access to a system or network by following an authorized
  person without permission.
  Piggybacking is when an attacker uses someone else's access to enter a
  secure area or system without permission.
  Piggybacking is the simple approach of following closely behind a person
  who has just used their own access card or PIN to gain physical access to
  a room or building.
  In this way an attacker can gain access to the facility without knowing the
  access code or acquiring an access card.
  Example:
  - A person enters a secure building by following an employee through a
    locked door without using their own ID card.
  - In Wi-Fi networks, piggybacking means using someone’s Wi-Fi without
    permission.
2. Shoulder Surfing:
  Shoulder surfing is a type of password attack. Password attack is the
  process of attempting to gain unauthorized access to restricted systems
  using common password or algorithms that guess passwords. In other
  words, it is an art of obtaining the correct password that gives access to a
  system protected by an authentication method.
  Shoulder surfing is a type of social engineering attack where someone
  secretly watches you while you enter confidential information like
  passwords, PINs, or credit card numbers.
  Shoulder surfing is the act of spying over someone's shoulder to steal
  sensitive information, usually in public places.
  Shoulder surfing is similar procedure, when an attackers position
  themselves in such a way that he is able to observe the authorized user
  entering the correct access code.
  This attack is by direct observation techniques, like looking over some
  one when he is entering PIN or password etc.
  Example:
  - Someone watches you type your ATM PIN from behind in a queue.
  - A person sitting next to you on a bus glances at your phone while you
    enter your password.
3. Dumpster diving:
  Password attack is the process of attempting to gain unauthorized access
  to restricted systems using common password or algorithms that guess
  passwords. In other words, it is an art of obtaining the correct password
  that gives access to a system protected by an authentication method.
  Dumpster diving is a social engineering attack where an attacker
  searches through discarded documents, storage devices or trash to
  obtain sensitive information.
  Dumpster diving is the act of retrieving sensitive data (like passwords,
  account details, or personal documents) from physical or digital waste.
Example:
  Finding and using old bank statements, password notes, or employee
   ID cards thrown in the trash.
  Recovering deleted files from unsecured old computers or hard drives.
 Difference between      Piggybacking,     Shoulder     Surfing   and
  Dumpster Diving.
Sr.        Piggybacking                 Shoulder Surfing              Dumpster Diving
No.
 1.   Piggybacking is a social       Shoulder Surfing is a         Dumpster Diving is a
      engineering         attack.    social        engineering     social engineering attack.
      Social        engineering      attack.             Social    Social engineering attack
      attack is a trick used by      engineering attack is a       is a trick used by
      attackers to fool people       trick used by attackers       attackers to fool people
      into giving away private       to fool people into giving    into giving away private
      information             like   away private information      information like password
      password       or     bank     like password or bank         or bank details.
      details.                       details.
 2.   Piggybacking       is      a   Shoulder surfing is a         Dumpster Diving is a
      method      where         an   method where someone          method       where      an
      attacker     gains        an   secretly watches you          attacker          searches
      unauthorized access to a       while      you       enter    through          discarded
      system or network by           confidential information      documents,         storage
      following an authorized        like password, PINs, or       devices or trash to find
      person             without     credit card numbers.          sensitive      information
      permission.                                                  such as passwords, bank
                                                                   details or personal data.
 3.   For    example:   If  an       For example: At an ATM,       For example: Many users
      authorized person enters       when you are entering         write down their sensitive
      their password and start       your     PIN,   someone       information or passwords
      user    session   on    a      secretly watches you          in diary or on papers.
      computer system but            while you enter it. This is   After some time, they
      then steps away without        called shoulder surfing.      throw it in the dustbin. An
      logging out or locking                                       attacker can find this
      the       screen,     an                                     paper and steal sensitive
      unauthorized person can                                      information or password.
      come and use that open                                       This is called dumpster
      session to gain access.                                      diving.
      This unauthorized use of
      an active session is
      called as piggybacking.
 4.   Piggybacking is when an        Shoulder surfing is the       Dumpster diving is the
      attacker uses someone          act   of   spying    over     act of retrieving sensitive
      else's access to enter a       someone's shoulder to         data    like    passwords,
      secure area or system          steal            sensitive    account      details,     or
      without permission.            information, usually in       personal documents from
                                     public places.                physical or digital waste.
 5.   To             prevent         To prevent shoulder           To prevent dumpster
      piggybacking: Do not           surfing:    Shield your       diving: Shred documents
      allow unknown people to        keypad     while   typing     before disposal. Properly
      follow you into secure         passwords      or   PINs.     wipe or destroy storage
      areas. Use ID cards or         Maintain distance from        devices               before
      biometric  access    for       others in queues.             discarding.
      entry.
 6.   Attack    method      is Attack method is Visual Attack method is Data
      Physical access (e.g., spying    (e.g.,  looking retrieval from discarded
      entering         behind over shoulder)           items
        someone)
                               Biometric
Phases of Biometric System:
  1. Enrollment Phase
  2. Recognition Phase
1. Enrollment Phase:
  Enrollment Phase is a phase of biometric system. Biometric
  system is a technology which takes an individual’s physiological,
  behavioral or both traits as input, analyze it, and identifies the
  individual as a genuine or malicious user.
  In this phase, biometric information of the user or person is recorded in a
  database.
  It is a one-time process. Generally, in this phase, measurement of the
  appropriate information is done very precisely.
  It is also called as registration phase.
  Steps involved:
    - Biometric data (e.g., fingerprint, face) is captured using a
      sensor.
    - Features are extracted from the data.
    - A biometric template is created.
    - This template is stored in a secure database.
  The purpose of this phase to create a reference template for
  future matching.
2. Recognition Phase:
  This is the second phase of the biometric system. Biometric
  system is a technology which takes an individual’s physiological,
  behavioral or both traits as input, analyze it, and identifies the
  individual as a genuine or malicious user.
  This phase is used to verify the identity of the person trying to access
  the system.
  This phase must be quick, accurate, and able to determine the
  authentication problem easily.
  Steps involved:
     - The user gives a new biometric input.
     - The system extracts features and creates a temporary
       template.
     - It compares this template with stored templates.
     - If it matches, access is granted; otherwise, denied.
  It is also called as authentication phase.
  The main purpose of the recognition phase is to confirm whether
  the person is who they claim to be.
1. Sensor: The sensor is the first block of the biometric system which
collects all the important data for biometrics. It is the interface between the
system and the real world. Typically, it is an image acquisition system, but it
depends on the features or characteristics required that it has to be
replaced or not.
2. Pre-processing: It is the second block that executes all the pre-
processing. Its function is to enhance the input and to eliminate artifacts
from the sensor, background noise, etc. It performs some kind of
normalization.
3. Feature extractor: This is the third and the most important step in the
biometric system. Extraction of features is to be done to identify them at a
later stage. The goal of a feature extractor is to characterize an object to be
recognized                          by                         measurements.
4. Template generator: The template generator generates the templates
that are used for authentication with the help of the extracted features. A
template is a vector of numbers or an image with distinct tracts.
Characteristics obtained from the source groups come together to form a
template. Templates are being stored in the database for comparison and
serve           as          input         for          the          match.
5. Matcher: The matching phase is performed by the use of a match. In this
part, the procured template is given to a matcher that compares it with the
stored templates using various algorithms such as Hamming distance, etc.
After    matching    the  inputs,    the   results  will  be   generated.
6. Application device: It is a device that uses the results of a biometric
system. The Iris recognition system and facial recognition system are some
common examples of application devices.
A person's biometric traits fall into the following three categories:
Biological
Physiological
Behavioral.
A physiological trait is a biological pattern found on or in the human body,
such as a face, fingerprints, iris pattern, DNA, hand geometry, etc.
Behavioral patterns, however, develop over time and become consistent
characteristics, such as handwriting, voice, gait, and typing rhythm. The
biometric feature that is used to identify an individual determines the type
of biometric system. Biological characteristics and behavioral traits of
individuals can be detected and from which distinct, repeatable biometric
features can be extracted to automate recognition.
Types                                      of                                     Biometrics
There         are         two         broad         categories         of         biometrics:
1. Physiological Biometrics
2. Behavioral Biometrics
Physiological Biometrics: Physical traits are measured for identification and
verification in this type of biometrics. The trait should be chosen such that it is unique
among the population, and resistant to changes due to illness, aging, injury, etc.
Physiological Biometric Techniques:
   Fingerprint: Fingerprints are unique for every individual. They can be measured in
    several ways. Minutiae-based measurement uses graphs to match ridges whereas
    image-based measurement finds similarities between the individuals' fingertips image
   and fingerprint images present in the database. It has high level of security and used
   both for identification and verification. However, due to old age or diseases/injury,
   fingerprint may get altered. Common usage: in mobiles for verification, in offices for
   identification.
 Facial Recognition: Features of the face like distance between nose, mouth, ears,
   length of face, skin color, are used for verification and identification. Accuracy can be
   affected by fog, sunglasses, aging, etc.
 Iris and Retina: Patterns found in the eye are unique and can be used for both
   identification and recognition. Devices to analyze retina are expensive and hence it is
   less common. Diseases like cataract may alter iris patterns
 Voice Recognition: The pitch, voice modulation, and tone, among other things are
   measured. Security is medium, due to the similarity in voice of people, hence used
   mostly for verification. The accuracy can be hindered due to the presence of noise, or
   due to aging or illness.
 DNA: DNA is unique and persistent throughout lifetime. Thus, security is high and can
   be used for both identification and verification.
Behavioral Biometrics:
Traits of human behavior are measured in this case. Monitoring is required in this type of
biometrics to prevent impersonation by the claimant.
 Signature: Signature is one of the most commonly used biometrics. They are used to
   verify checks by matching the signature of the check against the signature present in
   the database. Signature tablets and special pens are used to compare the signatures.
   Duration required to write the signature can also be used to increase accuracy.
   Signatures are mostly used for verification.
 Keystroke Dynamics: This technique measures the behavior of a person when
   typing on a keyboard. Some of the characteristics take into account are:
         o   Typing speed.
         o   Frequency of errors
         o   Duration of key depressions