Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication
What will be an ideal response?
Method:
There
are
many
potential
methods
to
defeating
authentication:
password
guessing,
brute-?force
attacks,
biometric
forgery,
identity
theft,
guessing
answers
to
password
reset
questions,
etc.
Opportunity:
Opportunity
changes
depending
on
a
variety
of
factors,
such
as
how
accessible
the
system
is,
how
it
behaves
when
a
user
fails
to
authenticate
a
number
of
times,
what
types
of
passwords
it
allows,
and
how
the
system
resets
lost
passwords.
Motive:
This
is
typically
something
of
value
the
attacker
might
gain
from
defeating
the
authentication.
Without
a
motive,
an
attacker
would
have
no
reason
to
execute
the
attack
and
certainly
not
to
pour
expensive
resources
into
it.
You might also like to view...
When first designing a database it is not important what data type you assign each field because you can easily change it later
Indicate whether the statement is true or false
Which layer of the OSI model may contain vulnerabilities that make a system susceptible to fragmentation attacks?
a. Session b. Transport c. Network d. Data Link