Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Richard P. Ayers; Wayne Jansen;|
|Title:||PDA Forensic Tools: an Overview and Analysis|
|Published:||August 01, 2004|
|Abstract:||Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals, and other business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defense for a mobile device that falls into the hands of an unauthorized individual. However, motivating users to enable simple PIN or password mechanisms and periodically update their authentication information is difficult at best. This paper describes a general-purpose mechanism for authenticating users through image selection. The underlying rationale is that image recall is an easy and natural way for users to authenticate, removing a serious barrier to users' compliance with corporate policy. The approach described distinguishes itself from other attempts in this area in several ways, including style-dependent image selection, password reuse, and embedded salting, which collectively overcome a number of problems in employing knowledge-based authentication on mobile devices.|
|Citation:||NIST Interagency/Internal Report (NISTIR) - 7100|
|Keywords:||computer forensics, forensic software, forensic toolkits, PDA, Personal Digital Assistant|
|Research Areas:||Computer Forensics, Computer Security|
|PDF version:||Click here to retrieve PDF version of paper (3MB)|