2.4 Summarize authentication and authorization design concepts. Flashcards

1
Q

Attestation

A

Prove the hardware is really yours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAR

A

False acceptance rate - Likelihood that an unauthorized user will be accepted
Not sensitive enough

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FRR

A

False rejection rate - likelihood that an authorized user will be rejected
Too sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CER

A

Crossover Error Rate - Defines the overal accuracy of a biometrix system
The rate at which FAR and FRR equal
Adjust sensitivity to equalize both values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

retinal scans

A

are more intrusive and accurate than iris scans. Retinal scans use an IR light to identify blood vessel patterns, which remain largely unchanged throughout a person’s lifespan. The equipment needed to perform retinal scans is expensive and the process is complex and intrusive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Iris Scans

A

match patterns on the surface of the eye using near-IR imaging, making the less intrusive and quicker than retinal scanning. Equipment is less expensive and easier to deploy, but iris scans might be spoofed with a high-resolution photo of a person’s eye.
Surface of eye imaging is performed by iris scans which is faster than retinal scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ROR

A

A rate of return (RoR) is considered the net gain or loss of an investment over a specified period of time and generally expressed as a percentage of the initial cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Directory Services

A

Directory services are the principal means of providing privilege management and authorization on an enterprise network. A key will be generated for the user, which contains the group members of the authenticated user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Authentication Credentials

A

Authentication credentials are provided by each user at logon to gain access to a system-defined account. While this is utilized in the scenario, directory services take the authentication credentials to have a key generated, for the user to access resources..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

distinguished name

A

A distinguished name is a unique identifier for any given resource within an X.500-like directory and is made up of attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly