Access Control-Passwords Flashcards

1
Q

What is user authentication?

A

Used to determine the identity of an individual accessing the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three approaches for user authentication?

A
  1. Knowledge-based
  2. Token-based
  3. Biometric
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is knowledge-based authentication?

A

Users prove their identity through something they know, e.g. a shared secret, password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is token-based authentication?

A

Users prove their identity through something they possess. E.g. passport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is biometric authentication?

A

Users prove their identity through a unique physiological characteristic e.g. fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the advantages of passwords?

A
  • Easy to use
  • Require no special equipment
  • Offer an adequate degree of security in many environments.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the disadvantages of passwords?

A
  • Users tend to choose passwords that are easy to guess.
  • Many password-cracking tools are available.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do we protect password tables?

A

Store the hashed password as opposed to the original password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are password tables prone to?

A

Dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a dictionary attack?

A

Attacker compiles a dictionary of several thousand common words and computes hash for each one. Uses the dictionary to look for matches between the dictionary and the password table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a better solution to ordinary password tables?

A

Add salt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is salting?

A

Where password tables append the salt to the password and hashes the result and stores it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are rainbow tables?

A

They involve computing chains. Chains start with some plaintext, and then is hashed and reduced repeatedly. The beginning and the end of the chain is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly