5.4 Security Password Policies Elements Flashcards
Summarize security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics). (31 cards)
What is the primary goal of a password management policy?
To ensure passwords are created, stored, and managed securely.
A good password management policy outlines procedures for creating strong passwords, changing them regularly, and securely storing them.
List the key components of an effective password management policy.
- Password creation rules
- Expiration policies
- History requirements
- Secure storage practices
Password creation rules: Guidelines for creating strong and secure passwords.
Expiration policies: Rules for changing passwords after a certain period.
History requirements: Ensuring users don’t reuse old passwords.
Secure storage practices: Methods for safely storing passwords, such as encryption.
Define:
password complexity
The requirement for passwords to contain a mix of characters.
Passwords should mix uppercase, lowercase, numbers, and symbols to increase security against brute-force and guessing attacks.
List an example of a secure password due to its complexity.
vg!Z867db
A secure password should incorporate upper- and lower-case letters, numbers, and special characters. The password ‘vg!Z867db’ meets these criteria, enhancing its resistance to attacks.
Fill in the blanks:
Passwords should be ______ and ______ to enhance security.
strong, unique
Using strong and unique passwords is crucial in protecting accounts from unauthorized access and cyber threats.
True or False:
Password expiration policies require users to change their passwords every 30 days.
False
While some organizations enforce regular password changes, the specific interval can vary, and not all systems require a 30-day reset.
Define:
password expiration
The policy requiring users to change their passwords after a set period.
Expiration periods, ranging from 30 to 90 days, help limit the time frame during which a compromised password remains valid.
Why are password history policies important in security management?
It prevents password reuse, reducing unauthorized access.
By enforcing the use of new passwords, these policies help avoid predictable patterns that could be exploited by attackers trying to guess passwords.
What is the primary benefit of multifactor authentication (MFA)?
It adds security by requiring multiple forms of authentication.
It usually involves a combination of something you know (password), something you have (token), and something you are (biometric feature).
How do digital certificates enhance security compared to passwords?
- They utilize public-key cryptography.
- They employ a key pair (public and private keys) for authentication.
- They offer a higher level of security than traditional passwords.
This method strengthens security by providing a more reliable and secure way to verify identities compared to password-based systems.
Define:
biometric authentication
Authentication based on unique physical traits.
Since physical traits are inherent to individuals, this method offers a high level of security by making it nearly impossible to replicate, ensuring strong identity verification.
True or False:
Biometric authentication is always more secure than passwords.
False
While biometrics are generally secure, they can be spoofed or misused, and are most effective when combined with other authentication methods.
List three common types of biometric authentication methods.
- Fingerprint recognition
- Facial recognition
- Iris scanning
Fingerprint recognition: Verifies identity by analyzing unique fingerprint patterns.
Facial recognition: Identifies individuals based on facial features.
Iris scanning: Uses the unique patterns in the iris for identification.
How are passwords typically stored securely in a system?
They are hashed and salted before storage.
Hashing converts passwords into a fixed-length value, while salting adds random data to make each password hash unique and resistant to attacks.
Define:
password salt
Random data added to passwords before hashing.
Salting ensures that identical passwords produce different hashes, preventing attackers from using precomputed hashes (rainbow tables) to crack passwords.
Define:
hashing algorithm
A function that converts a password into a fixed-length string.
Hashing algorithms like SHA-256 or MD5 are used to ensure that passwords are stored securely, making it nearly impossible to recover the original password from the hash.
True or False:
Passwords are the only authentication method in high-security environments.
False
High-security environments typically require additional forms of authentication, such as biometrics or certificates, in addition to passwords.
What is the role of a password manager in password management?
To securely store and organize passwords.
Password managers help users maintain strong, unique passwords for every account without the need to remember them all.
Why should users avoid using the same password across multiple accounts?
It increases the risk of a breach if one account is compromised.
Using unique passwords for each account limits the damage if one password is exposed, preventing cross-account attacks.
Define:
password strength
The ability of a password to resist attacks.
Strong passwords are long, complex, and random, making them difficult to guess or crack through methods like brute force or dictionary attacks.
True or False:
A password policy should prevent the use of personal information.
True
Personal information, like names or birthdates, is often easy for attackers to guess or find, so it should be avoided to enhance password security.
Define:
two-factor authentication (2FA)
Authentication that requires two different verification methods.
2FA typically combines something you know (password) with something you have (token or phone), providing an additional layer of security.
What are three benefits of using multifactor authentication (MFA)?
- Reduces unauthorized access risk
- Enhances overall security
- Protects against stolen or compromised passwords
MFA provides additional layers of security, especially when passwords are weak or stolen.
List four types of multifactor authentication factors.
- Something you know
- Something you have
- Something you are
- Somewhere you are
Something you know: e.g., a password or PIN.
Something you have: e.g., a smartphone or security token.
Something you are: e.g., a fingerprint or facial recognition.
Somewhere you are: e.g., your current physical location determined via GPS.