This video belongs to the openHPI course Digital Identities. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:01Now we want to introduce Digital Identities. This is the topic of our
- 00:06OpenHPI course about digital identities,
- 00:10and the question is Who we are on the internet?
- 00:15Ofcourse with the physical identities we know how to deal,
- 00:19this is what we do in everyday life. But before we can use a
- 00:23web service on the internet, we have to identify ourself to the service,
- 00:29because the service needs to be able to recognize who we are,
- 00:35and when we come next time to remember which permissions we have.
- 00:41As I mentioned in the physical world,
- 00:43identification is easy. We identify ourselves through our outer appearance,
- 00:49with our physical identity. So people who know us can remember our face.
- 00:56our outer appearance. our voice and then say, okay this is Christoph Meinel.
- 01:02But how we can identify ourselves on the internet?
- 01:06To show a photo or video and to claim this is Christoph Meinel it's very easy.
- 01:12But for the partner, it's completely unclear whether it's only
- 01:17a photo or whether it's a real identity.
- 01:21So we can't identify ourselves through our physical presence, but
- 01:26what we can do we can represent and identify ourself by a collection of
- 01:32electronic data. And exactly this is a digital identity, a collection of
- 01:39electronic data, in more detail of electronic attributes.
- 01:46Such attributes are for example, our address, our password, our email address,
- 01:52our passport ID, our credit card, the telephone number or the account number.
- 01:59So a combination of these data identifies ourself and forms a
- 02:05digital identity.
- 02:09What we have to do when we want to
- 02:13use a web service, we have to prove
- 02:18that we own such a digital identity, it is our data.
- 02:24This telephone data and this email data and others.
- 02:28So there are numerous ways to provide such a proof, we can prove that we own
- 02:37a digital identity by knowing something, for example knowing
- 02:42a secret password or knowing a secret pin.
- 02:45We can prove the ownership by the ownership of something, for example,
- 02:51a smart card or a token.
- 02:55We can prove that we own this or we can show biometric characteristics, for example,
- 03:02fingerprint or face or iris.
- 03:07But most common and a very simple method is the use of passwords.
- 03:13These are easy to implement with little effort for the user,
- 03:17but we have to remember this use of password for authentication is quite unsecure
- 03:24and holds great dangers. Original
- 03:28approach to submit such a proof by knowing a password
- 03:33was introduced when the personal computers came up. So to prove to the computer
- 03:40that I am allowed to access this data.
- 03:45But to use for authentication of a web service,
- 03:49there are many problems and weaknesses and we will discuss about
- 03:55this. The password must be stored in the database of the service.
- 04:01So when we register and we design a password,
- 04:04we have to remember the password and the service has to remember
- 04:08the password. So the service stores the passwords in its customer database,
- 04:15and later on the service is able to verify
- 04:22that this password belongs to us, to verify our digital identity
- 04:28during the login process.
- 04:32In a professional way the data, the password is not allowed to
- 04:36secured in the database in clear text, but it has to be
- 04:43stored in hashed form so that all the people working
- 04:49outside of the service are not able to understand the password itself.
- 04:55There are many attacks known to try to steal
- 05:01the user data. User data are most interesting for cyber
- 05:06criminals, because with this user data they can access a service
- 05:13and can interact with the service under the stolen name.
- 05:19And the possibilities how attackers can attack a service to
- 05:25steal user data, this is by exploiting some software vulnerabilities.
- 05:31This is possible by social engineering,
- 05:34for example, to play
- 05:37that they are an administrator of the service and ask the user to send him
- 05:43or to tell him the password to install something.
- 05:47So the stolen identity data can in many different ways be misused,
- 05:55and the idea every time is to assume a digital identity, and then
- 06:01interact with the service, use the resources of the services
- 06:05in the name of that identity. This is the
- 06:09field of identity theft we will discuss
- 06:12in the course more about this.
- 06:16So such identity leaks here is a short
- 06:20report of a very recent case, under the name Collection
- 06:26number 1 to number 5.
- 06:28Records were published on the internet in January 2019,
- 06:35that contained a total of 2.1 one billion
- 06:40email addresses with the corresponding passwords in plain text.
- 06:47So these are ofcourse identity data, and this is a huge amount of identity
- 06:53data which were published in the internet and the cybercriminals could access,
- 06:59could take this data and then work with this data.
- 07:02In some cases the exact services from which the identity data
- 07:07was stolen were specified, so that it becomes very easy
- 07:12for the attacker to misuse an identity for that
- 07:18particular service and the attackers can quickly test identity access data
- 07:24for different platforms, simply because the users often use the same password
- 07:30for different services.
- 07:33This identity leaks and this identity theft
- 07:38is extremely dangerous, it's extremely dangerous for the persons affected.
- 07:45Reason is their digital identities remain vulnerable as long
- 07:50as the stolen password
- 07:53are valid. So as long as they do not change the password, the cybercriminals could misuse
- 08:00the identity in using the service. Here is another case,
- 08:06in December 2018, data and documents of roughly a
- 08:121000 politicians and celebrities were published in the internet,
- 08:17and these data include internal and personal documents, as well as contact data
- 08:24such as email addresses,
- 08:27telephone numbers, or post address of the celebrities concerned.
- 08:33And it caused a lot of discussion. How was it possible
- 08:38for the cybercriminals to a collect such
- 08:42personal data?
- 08:45So the more identity data about a person
- 08:48comes in the hands of the cybercriminals,
- 08:52the more easily these identities can be misused. So it's a real
- 08:58problem and it's very important to know more about
- 09:05digital identities, ways how they can be established, the ways
- 09:11how to manage such identities and how to use it.
- 09:16So what we want to do in our course in the first week,
- 09:20we will speak in general digital identities, who I am in the internet?
- 09:27And in the first course week, we consider how digital identities are defined
- 09:33and we discuss the different ways to manage such digital identities.
- 09:38So it is the topic of identity management which is a in the center
- 09:44of the first week. And we discuss how to prove
- 09:49that one has a certain digital identity.
- 09:53And these our the discussions of authentication methods
- 09:57we want to do in the first week. And then in the second week,
- 10:01we deal with questions which attacks
- 10:06are known on digital identities, which attacks are possible and how
- 10:11best to protect your digital identity. And in addition, we
- 10:17look at the problem of weak passwords and give advises
- 10:22on how to choose strong passwords and what influence strong passwords have
- 10:28on possible attacks. Because the identification by
- 10:34passwords is very common in the internet and we have to deal
- 10:40with this relatively weak method in a best possible way.
- 10:46So to introduce the teaching team, my name is Christiph Meinel, I am
- 10:52the head of the Hasso Plattner Institute and run the chair for
- 10:56Internet Technologies and Systems. This research focuses
- 11:01on security engineering, on learning and knowledge engineering, digital education
- 11:08and innovation research. And I am supported
- 11:11by my PhD students, Alexander Muhle and Chris Pelchen. Alexander
- 11:19is working in his
- 11:22research for the thesis on Secure Identities on peer to peer applications
- 11:29with certification process in international consortium.
- 11:33And Chris Pelchen is working in the field of security engineering,
- 11:39identity on the internet and has a lot to do with this a a digital
- 11:44identity theft and our service to inform you about this.
- 11:51So this is the introduction to our
- 11:56new openHPI course, digital identities. We hope you are interested to
- 12:01learn more about that.
- 12:03We are happy if you stay with us and if you start to interact
- 12:09with the other learners by using our discussion forum, by
- 12:16answering the questions in the quizzes and in the
- 12:21homeworks. And hope also you have fun with the course.
To enable the transcript, please select a language in the video player settings menu.