Advertisement

Current Use of User Authentication

  • Nathan Clarke
Chapter

Abstract

Information security has become increasingly important as technology integrates into our everyday lives. In the past 10 years, computing-based technology has ­permeated every aspect of our lives from desktop computers, laptops and mobile phones to satellite navigation, MP3 players and game consoles. Whilst the motivation for keeping systems secure has changed from the early days of mainframe systems and the need to ensure reliable audits for accounting purposes, the underlying requirement for a high level of security has always been present.

Keywords

Information Security Intrusion Detection System Biometric System False Acceptance Rate False Rejection Rate 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. AccessData: AccessData password recovery toolkit. AccessData. Available at: http://accessdata.com/products/forensic-investigation/decryption (2011). Accessed 10 Apr 2011
  2. APACS: Fraud: The facts 2008. Association for payment clearing services. Available at: http://www.cardwatch.org.uk/images/uploads/publications/Fruad%20Facts%20202008_links.pdf (2008). Accessed 10 Apr 2011
  3. Ashbourn, J.: Biometrics: Advanced Identity Verification: The Complete Guide. Springer, London (2000). ISBN 978-1852332433Google Scholar
  4. BBC: Credit card cloning. BBC inside out. Available at: http://www.bbc.co.uk/insideout/east/series3/credit_card_cloning.shtml (2003). Accessed 10 Apr 2011
  5. BBC: Passwords revealed by sweet deal. BBC News. Available at: http://news.bbc.co.uk/1/hi/technology/3639679.stm (2004). Accessed 10 Apr 2011
  6. BBC: Personal data privacy at risk. BBC News. Available at: http://news.bbc.co.uk/1/hi/business/7256440.stm (2008a). Accessed 10 Apr 2011
  7. BBC: Oyster card hack to be published. BBC News. Available at: http://news.bbc.co.uk/1/hi/technology/7516869.stm (2008b). Accessed 10 Apr 2011
  8. Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones – A survey of attitudes and opinions. Comput. Secur. 24(7), 519–527 (2005)CrossRefGoogle Scholar
  9. Crown Copyright: Computer misuse act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/1990/18/contents (1990). Accessed 10 Apr 2011
  10. Crown Copyright: Data protection act 1988. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/1998/29/contents (1998). Accessed 10 Apr 2011
  11. Crown Copyright: Regulation of investigatory powers act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2000/23/contents (2000a). Accessed 10 Apr 2011
  12. Crown Copyright: Electronic communication act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2000/7/contents (2000b). Accessed 10 Apr 2011
  13. Crown Copyright: Police and justice act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2006/48/contents (2006). Accessed 10 Apr 2011
  14. de Winter, B.: New hack trashes London’s Oyster card. Tech world. Available at: http://news.techworld.com/security/105337/new-hack-trashes-londons-oyster-card/ (2008). Accessed 10 Apr 2011
  15. Deyal, G.: MiFare RFID crack more extensive than previously thought. Computer world. Available at: http://www.computerworld.com/s/article/9078038/MiFare_RFID_crack_more_extensive_than_previously_thought (2008). Accessed 10 Apr 2011
  16. Espiner, T.: Chip and PIN is broken, says researchers. ZDNet UK. Available at: http://www.zdnet.co.uk/news/security-threats/2010/02/11/chip-and-pin-is-broken-say-researchers-40022674/ (2010). Accessed 3 Aug 2010
  17. Furnell, S.M.: Computer Insecurity: Risking the System. Springer, London (2005). ISBN 978-1-85233-943-2Google Scholar
  18. IBG: How is biometrics defined? International Biometrics Group. Available at: http://www.biometricgroup.com/reports/public/reports/biometric_definition.html (2010a). Accessed 10 Apr 2011
  19. Imperva: Consumer password worst practices. Imperva Application Defense Centre. Available at: http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf (2010). Accessed 10 Apr 2011
  20. ISO: ISO/IEC 27002:2005 information technology – Security techniques – Code of practice for information security management. International Standards Organisation. Available at: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50297 (2005a). Accessed 10 Apr 2011
  21. Kent, J.: Malaysia car thieves steal finger. BBC News. Available at: http://news.bbc.co.uk/1/hi/world/asia-pacific/4396831.stm (2005). Accessed 10 Apr 2011
  22. Kissel, B.: OpenID 2009 year in review. OpenID Foundation. Available at: http://openid.net/2009/12/16/openid-2009-year-in-review/ (2009). Accessed 10 Apr 2011
  23. Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial ‘gummy’ fingers on fingerprint systems. Proc. SPiE 4677, 275–289 (2002)Google Scholar
  24. Michael, S.: Facial recognition fails at Black Hat. eSecurity planet. Available at: http://www.esecurityplanet.com/trends/article.php/3805011/Facial-Recognition-Fails-at-Black-Hat.htm (2009). Accessed 10 Apr 2011
  25. NatWest.: The secure way to get more from online banking. NatWest Bank. Available at: http://www.natwest.com/personal/online-banking/g1/banking-safely-online/card-reader.ashx (2010). Accessed 10 Apr 2011
  26. Ophcrack.: What is ophcrack?. Sourceforge. Available at: http://ophcrack.sourceforge.net/ (2011). Accessed 10 Apr 2011
  27. Schneier, B.: Real-world passwords. Bruce Schneier Blog. Available at: http://www.schneier.com/blog/archives/2006/12/realworld_passw.html (2006). Accessed 10 Apr 2011
  28. Security Focus.: @Stake LC5. Security focus. Available at: http://www.securityfocus.com/tools/1005 (2010). Accessed 10 April 2011
  29. Wood, H.: The use of passwords for controlling the access to remote computer systems and services. In: Dinardo, C.T. (ed.) Computers and Security, vol. 3, p. 137. AFIPS Press, Montvale (1977)Google Scholar

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  1. 1.Centre for Security, Communications & Network Research (CSCAN)Plymouth UniversityPlymouthUK

Personalised recommendations