You are on page 1of 5

Side notes –

Supplement doc – 31/32 pages

Identification = claim
authentication by knowledge = CAPTCHA

1. SOMETHING know
2. SOMETHING have
3. SOMETHING are

SOMETHING YOU DO - KEYBOARD -FLIGHT TIME + DWELL TIME /SIGNATURE DYNAMICS & GAIT

SOMEWHERE YOU ARE - COMPUTER NAME, IP ADDRESS, GPS

SFA

2FA

MFA = 2fa or 3

Token card + key fingerprint + facial


CER CROSS OVER ERROR RATE= EER
Smart Card Attacks – new content+++

Task based access control +++

Database views – record level ac (compromised by aggregation)


Types of controls - table

Link ids/ips – how they process ???

https://www.youtube.com/watch?v=hEgWPWIuq_s&t=251s from beginning till he done talking about


heuristics

5 year old hacks xbox - https://www.youtube.com/watch?v=ZYur8lW3-WI

You might also like