5.4 Security Password Policies Elements Flashcards

Summarize security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics). (31 cards)

1
Q

What is the primary goal of a password management policy?

A

To ensure passwords are created, stored, and managed securely.

A good password management policy outlines procedures for creating strong passwords, changing them regularly, and securely storing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the key components of an effective password management policy.

A
  • Password creation rules
  • Expiration policies
  • History requirements
  • Secure storage practices

Password creation rules: Guidelines for creating strong and secure passwords.

Expiration policies: Rules for changing passwords after a certain period.

History requirements: Ensuring users don’t reuse old passwords.

Secure storage practices: Methods for safely storing passwords, such as encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define:

password complexity

A

The requirement for passwords to contain a mix of characters.

Passwords should mix uppercase, lowercase, numbers, and symbols to increase security against brute-force and guessing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List an example of a secure password due to its complexity.

A

vg!Z867db

A secure password should incorporate upper- and lower-case letters, numbers, and special characters. The password ‘vg!Z867db’ meets these criteria, enhancing its resistance to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fill in the blanks:

Passwords should be ______ and ______ to enhance security.

A

strong, unique

Using strong and unique passwords is crucial in protecting accounts from unauthorized access and cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False:

Password expiration policies require users to change their passwords every 30 days.

A

False

While some organizations enforce regular password changes, the specific interval can vary, and not all systems require a 30-day reset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define:

password expiration

A

The policy requiring users to change their passwords after a set period.

Expiration periods, ranging from 30 to 90 days, help limit the time frame during which a compromised password remains valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why are password history policies important in security management?

A

It prevents password reuse, reducing unauthorized access.

By enforcing the use of new passwords, these policies help avoid predictable patterns that could be exploited by attackers trying to guess passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary benefit of multifactor authentication (MFA)?

A

It adds security by requiring multiple forms of authentication.

It usually involves a combination of something you know (password), something you have (token), and something you are (biometric feature).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do digital certificates enhance security compared to passwords?

A
  • They utilize public-key cryptography.
  • They employ a key pair (public and private keys) for authentication.
  • They offer a higher level of security than traditional passwords.

This method strengthens security by providing a more reliable and secure way to verify identities compared to password-based systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:

biometric authentication

A

Authentication based on unique physical traits.

Since physical traits are inherent to individuals, this method offers a high level of security by making it nearly impossible to replicate, ensuring strong identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False:

Biometric authentication is always more secure than passwords.

A

False

While biometrics are generally secure, they can be spoofed or misused, and are most effective when combined with other authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List three common types of biometric authentication methods.

A
  1. Fingerprint recognition
  2. Facial recognition
  3. Iris scanning

Fingerprint recognition: Verifies identity by analyzing unique fingerprint patterns.

Facial recognition: Identifies individuals based on facial features.

Iris scanning: Uses the unique patterns in the iris for identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are passwords typically stored securely in a system?

A

They are hashed and salted before storage.

Hashing converts passwords into a fixed-length value, while salting adds random data to make each password hash unique and resistant to attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define:

password salt

A

Random data added to passwords before hashing.

Salting ensures that identical passwords produce different hashes, preventing attackers from using precomputed hashes (rainbow tables) to crack passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:

hashing algorithm

A

A function that converts a password into a fixed-length string.

Hashing algorithms like SHA-256 or MD5 are used to ensure that passwords are stored securely, making it nearly impossible to recover the original password from the hash.

17
Q

True or False:

Passwords are the only authentication method in high-security environments.

A

False

High-security environments typically require additional forms of authentication, such as biometrics or certificates, in addition to passwords.

18
Q

What is the role of a password manager in password management?

A

To securely store and organize passwords.

Password managers help users maintain strong, unique passwords for every account without the need to remember them all.

19
Q

Why should users avoid using the same password across multiple accounts?

A

It increases the risk of a breach if one account is compromised.

Using unique passwords for each account limits the damage if one password is exposed, preventing cross-account attacks.

20
Q

Define:

password strength

A

The ability of a password to resist attacks.

Strong passwords are long, complex, and random, making them difficult to guess or crack through methods like brute force or dictionary attacks.

21
Q

True or False:

A password policy should prevent the use of personal information.

A

True

Personal information, like names or birthdates, is often easy for attackers to guess or find, so it should be avoided to enhance password security.

22
Q

Define:

two-factor authentication (2FA)

A

Authentication that requires two different verification methods.

2FA typically combines something you know (password) with something you have (token or phone), providing an additional layer of security.

23
Q

What are three benefits of using multifactor authentication (MFA)?

A
  1. Reduces unauthorized access risk
  2. Enhances overall security
  3. Protects against stolen or compromised passwords

MFA provides additional layers of security, especially when passwords are weak or stolen.

24
Q

List four types of multifactor authentication factors.

A
  1. Something you know
  2. Something you have
  3. Something you are
  4. Somewhere you are

Something you know: e.g., a password or PIN.​

Something you have: e.g., a smartphone or security token.​

Something you are: e.g., a fingerprint or facial recognition.​

Somewhere you are: e.g., your current physical location determined via GPS.​

25
List the **steps involved** in configuring MFA in a system.
1. Enable a primary authentication method. 1. Select additional authentication factors. 1. Integrate the secondary factors. 1. Test the MFA setup. ## Footnote **Enable a primary authentication method**: Set up a standard authentication method, such as a password or PIN. **Select additional authentication factors**: Choose one or more secondary factors, such as a mobile device, biometric scan, or security token. **Integrate the secondary factors**: Implement the chosen secondary factors into your authentication system. **Test the MFA setup**: Verify that the MFA system works as intended, requiring multiple forms of verification during the authentication process.
26
Why is MFA **preferred** over SFA?
MFA **reduces the risk** of unauthorized access, even if one factor is compromised. ## Footnote Requiring multiple verification steps, **MFA** provides an extra layer of security, making it harder for attackers to gain access with just one piece of information, like a password.
27
Why are **hardware tokens** considered secure MFA?
It provides a physical, tamper-resistant **method** of verifying identity. ## Footnote Hardware tokens *generate time-based codes* or *cryptographic keys* that are difficult to replicate, offering a higher level of security compared to software-based methods.
28
List *four* **best practices** for effective password management.
1. Use strong, unique passwords. 1. Implement multifactor authentication. 1. Set password expiration dates. 1. Avoid reusing passwords. ## Footnote Following these best practices helps *mitigate risks of account compromise* due to weak or reused passwords.
29
# True or False: Writing down **complex passwords** for easy access is acceptable.
False ## Footnote *Writing down passwords* **compromises** security since they can be lost or stolen. Using a password manager is a safer alternative.
30
Describe the **steps involved** in verifying a password in a secure system.
1. The entered password is hashed. 1. The hash is compared to the stored hash. ## Footnote This ensures the password **matches** the original without exposing it in clear text.
31
What’s the **difference** between symmetric and asymmetric encryption?
* **Symmetric encryption** uses the same key for both encryption and decryption. * **Asymmetric encryption** uses a public key for encryption and a private key for decryption. ## Footnote Asymmetric encryption (used in certificates) is *more secure* because the private key is never shared, unlike symmetric encryption, which uses a shared secret key.