From the course: Threat Modeling: Spoofing In Depth

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Account creation

Account creation

From the course: Threat Modeling: Spoofing In Depth

Start my 1-month free trial

Account creation

- Some systems don't have any authentication, like a TV. Why would a TV have a password? I might want my hotel room TV to have one, especially if there are kids around. The need for authentication is situational. Once you know you want authentication, you need to decide what it'll be. A very common pattern on multi-user systems is the combination of an identifier, or username, and an authenticator like a password. That doesn't exist on a TV. Even a hotel TV has just one account, like a phone in 2015. Accounts don't just spring into existence. There's a process for making each one. The intensity of that process ranges from show up and ask for one to get a job, undergo a thorough background check, sign a contract, and then an administrator creates the account. That process is called account creation, account issuance, or even identity issuance. I don't know what sort of weirdo issues an identity sounds very man in the gray flannel suit, if you ask me. There's a common way to think about…

Contents