L7 - Identification & Authentication Flashcards

1
Q

What are the two steps to authentication?

A

Identification and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the steps of authentication what is identifications role?

A

To announce who you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the steps of authentication what is authentications role?

A

You prove who you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four ways of authenticating a user identity based on?

A

Something…:
* the individual knows
* the individual posseses
* the individual is
* the individual does

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The four ways of authenticating a user

Something the indiviual knows refers to what?

A

E.g Password, pin or answeres to prearanged questions etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The four ways of authenticating a user identity

Something the indiviual possesses refers to what?

Token

A

E.g smartcard, electronic keycard, physical key etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The four ways of authenticating a user

Something the indiviual is refers to what?

Static biometrics

A

E.g fingerprints, retina, face etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The four ways of authenticating a user

Something the indiviual does refers to what?

Dynamic biometrics

A

E.g Voice pattern, handwriting, typing rythm, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is multifactor authentication?

A

It’s an authentication combining two types, e.g entering a password and providing a token.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is password authentication?

A

It’s a shared secret between user and system. The user provides the system with:

  • cretentials
  • password

The system then compares password with stored password of that credential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a user-ID provide?

A
  • Determination if the user is authorized to acces the system
  • User privileges
  • Also used in discretionary access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passwords are vulnerable against what types of attacks?

A
  • Offline dictionary attack
  • Specific account attack
  • Popular password attack
  • Password guessing against a single user
  • Workstation hijacking
  • Exploiting user misstakes
  • Exploiting multiple password use
  • Electronic monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How could you protect a password file?

A

By using:
* Cryptograpghic protection
* access control enforced by the operating system
* combination of both of above with further measures to slow down dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cryptographic protection?

A

Cryptography provides for secure communication in the presence of malicious third-parties. Encryption uses an algorithm and a key to transform an input (i.e., plaintext) into an encrypted output (i.e., ciphertext).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a one-way function?

A

a one way function is a function which is relatively easy to compute but hard to reverse.

Given an input x it is easy to compute f(x), but given an output y it is hard to find x so that y= f(x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does a one-way function work?

A

Instead of storing the password x it’s instead the value from f(x) that is stored. When logging in with an identical password x’ the function f(x’) and its output should match what’s stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does password salting work?

A

Before hashing a password a salt is added to the end of the password, this will slow down dictionary attacks. And if two users have same passwords they now have different hash values after adding a salt, therefore they will also have separate entries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the different password selection strategies?

A
  • User education
  • Computer generated passwords
  • Reactive password checking
  • Complex password policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does user education entail?

A

Informing users of the importance of creating hard to crack passwords and guidelines for selecting strong passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Computer generated passwords are hard to crack, but are there drawbacks for the users?

A

A computer generated password can be very hard to remember, which could result in it being written on a piece of paper.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is reactive password checking?

A

The system periodacally runs it’s own password cracker in order to find weak/guessable passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the complex password policy?

A

The user is allowed to select it’s own password, however the system checks to see if the password is allowable, if not the password is rejected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the goal of the complex password policy?

A

The goal is to eliminate guessable passwords while the user is still allowed to select a password which is easy for them to remember.

24
Q

What are the proactive password checks?

A
  • Rule enforcement
  • Password checker
  • Bloom filter
25
Q

What is rule enforcement?

proactive password checks

A

Specific rules which passwords must adhere to in order to be selected.

26
Q

What is a password checker?

proactive password checks

A

A large complied dictionary of passwords not to use.

27
Q

What is bloom filter?

proactive password checks

A

a filter used to build a table based on hash values, a desired password is then checked against this table.

28
Q

What is a spoofing attack?

password

A

It’s an attack where a users password is sent to a part who they have no actual desire to share the password with. It’s often done by misleading the user into entering their password in a field they believe to be for a trusted part.

29
Q

How can a spoofing attack be countered?

A
  • By using trusted path
  • Display number of failed logins
  • Mutual authentication
30
Q

What is the trusted path?

A

It’s a way of guaranteeing that the user communicates with the operating system and not a spoofing program.

Using ctrl + alt + delete on windows is a trusted path.

31
Q

What can be done in mutual verification?

A
  • Exchanging secret codes in both directions.
  • Showing a personalized picture
  • SSL Extended Validation Certificate
32
Q

What is TLS used for?

A

Is a newer version of SSL that encrypts the data sent over the network.

Transport layer security*

33
Q

What is SSL used for?

A

t’s the standard technology for keeping an internet connection secure and safeguarding any sensitive data that is being sent between two systems, preventing criminals from reading and modifying any information transferred, including potential personal details.

Socket security layer*

34
Q

What is shoulder surfing?

A

It’s when a threat agent gains knowledge about a password through watching a screen or keyboard.

A countermeasure for this is to hide typed characters and replace them with a dot.

35
Q

What is single sign-on

A

It’s a service intended to help you with managing loggin in so that you only have to enter a password once. Since all passwords are stored it’s convenient, but could also raise new concerns to security.

36
Q

What is token authentication?

A

It’s a process of identifying that a user is who they claim to be by presenting a token.

37
Q

How does token authentication work?

A
38
Q

What are some common tokens?

Token authentication

A
  • Magnetic stripe
  • Memory cards
  • Smart cards, contact or contactless.
39
Q

How does token authentication work?

A

When prompted the user will have to present their physical token to the designated spot. That user will have all the rights regardless if they are the intended user for the token.

40
Q

What differentiates memory card and smart cards from eachother?

A
  • Mem. card: Store but not process data, contains internal electoric memory.
  • Smart card: Has an electronic interface, may use smart token protocols and contains an entire microprocessor
41
Q

What are the types of biometric systems?

A

Static
* Facial characteristics
* Fingerprints
* Hand geometry
* Retinal pattern
* Iris

Dynamic
* Signature
* Voice

42
Q

What is the cost over effectiveness for facial characteristics

Cost = cost to implement, accuracy = effective recognition

A

Low cost, low accuracy

43
Q

What is the cost over effectiveness for fingerprint

Cost = cost to implement, accuracy = effective recognition

A

below average cost, above average accuracy

44
Q

What is the cost over effectiveness for hand geometry

Cost = cost to implement, accuracy = effective recognition

A

high cost, low accuracy

45
Q

What is the cost over effectiveness for retinal pattern

Cost = cost to implement, accuracy = effective recognition

A

above average cost, average accuracy (same as fingerprint).

46
Q

What is the cost over effectiveness for iris

Cost = cost to implement, accuracy = effective recognition

A

high cost, high accuracy

47
Q

What is the cost over effectiveness for iris

Cost = cost to implement, accuracy = effective recognition

A

high cost, high accuracy

48
Q

What is the cost over effectiveness for signature

Cost = cost to implement, accuracy = effective recognition

A

high cost, low accuracy

49
Q

What is the cost over effectiveness for voice

Cost = cost to implement, accuracy = effective recognition

A

high cost, low accuracy

50
Q

How does the operation of a biometric system work?

A

It’s seperated into three phases: enrollment, verification & identification.

51
Q

What is enrollment?

operation of a biometric system

A

Is the collection of a users biometric, the biometric is then stored in a database for comparison in future authentications.

52
Q

What is verification?

operation of a biometric system

A

It’s when the user prompts the same biometric data that was stored in enrollment, the biometric is then compared to see if there is a match for a given user.

53
Q

What is identification?

operation of a biometric system

A

It’s when the biometric is used to identify the user from a database of N persons.

54
Q

What are some common problems in biometric systems?

A
  • If there is a match above a predefined threshhold a user is accepted.
  • False positives and negatives.
55
Q

What is equal-error rate?

A

It’s when false match rate is equal to false non-match rate.

56
Q

When is biometrics a good option?

A
  • uniqueness checking for detecting duplicate identities. Example: voter registration or welfare applications.
  • Low security apps using low FNMR: such as fingerprint or face recog in smartphones.
  • High security authentication: as a secondary security measure to reduce FMR and increase difficulty to missuse.