| Client Attack |
Password |
Guessing, exhaustive search |
Large entropy; limited attempts |
| Client Attack |
Token |
Exhaustive search |
Same as password; theft of object requires presence |
| Client Attack |
Biometric |
False match |
Same as password |
| Host Attack |
Password |
Plaintext theft, dictionary/exhaustive search |
Hashing; large entropy; protection of password database |
| Host Attack |
Token |
Passcode theft |
Same as password; 1-time passcode |
| Host Attack |
Biometric |
Template theft |
Capture device authentication; challenge response |
| Eavesdropping, theft, and copying |
Password |
Shoulder surfing |
User diligence to keep secret; administrator diligence to quickly revoke compromised passwords; multifactor authentication |
| Eavesdropping, theft, and copying |
Token |
Theft, counterfeiting hardware |
Multifactor authentication; tamper resistant/evident token |
| Eavesdropping, theft, and copying |
Biometric |
Copying biometric |
Copy detection at capture device and capture device authentication |
| Replay |
Password |
Replay stolen password response |
Challenge-response protocol |
| Replay |
Token |
Replay stolen passcode response |
Challenge-response protocol; 1-time passcode |
| Replay |
Biometric |
Replay stolen biometric template response |
Copy detection at capture device and capture device authentication via chanllenge-response protocol |
| Torjan horse |
Password, token, biometric |
Installation of rogue client or capture device |
Authentication of clinet or capture device within trusted security perimeter |
| Denial of service |
Password, token, biometric |
Lockout by multiple failed authentications |
Multifactor with token |