Authenticating users Flashcards

1
Q

Authentication

A

Process of determining whether someone or something is who or what it declates itself to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where are users credentials stored for authentication?

A

Database of authorised, or registered, users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication vs Authorisation

A

Authentication is the process of validating the identity of a registered user before allowing access whereas,
Authorisation is the process of validating that the authenticated user has been granted permission to access the requested resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When can authentication be broken

A

When an attacker is able to be authenticated as a legitimate user
Happens when the attacker can guess, or brute force credentials.
When credentials are leaked and the attacker gets access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute force attack

A

Trying all possible solutions to a problem until a correct solution is found
Can be used to break authentication methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Controlling brute force attacks

A

Strong password policy
Biometrics - fingerprint scanners
Notification of unrecognised login - users are notified and asked to confirm a login
Comprehensive login process - CAPTCHA(providing user is human) and Two Factor Authentication(more than just a password)
Limiting login attempts - lock user after certain number of attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multi-factor authorisation

A

Requires two or more proofs of identity to authenticate a user
One time passwords or ReCAPTCHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why use MFA?

A

Helps prevent someone from signing into a user’s account, even if they know the password.
Passwords can be insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Strong secondary authentication factors

A

OTP - one-time password,
Time-based PIN
Digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an OTP

A

One time password - Unique and can only be used once
Usually, a short string of numbers is generated based on a secret stored in a physical device such as a smartphone or USB token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Time-based PIN

A

A sequence of digits which have to be entered within a short window(30 to 60 secs)
Can be generated by a software application or hardware device with a very precise lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Digital certificates

A

Issued by a trusted certificate authority, is installed on a device or in the users browser
Only browser with valid certificate will be allowed to sign in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do CAPTCHAs provide

A

Challenges that are difficult for computers to perform but relatively easy for humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of CAPTCHA

A

Text based
Image based
Audio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which is the most difficult type of CAPTCHA for bots but the easiest for humans to interpret

A

Image-based - as it requires image recognition and semantic classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advantages of CAPTCHA

A

Highly effective against all but most sophisticated bad bots

17
Q

Disadvantages of CAPTCHA

A

Disruptive and frustrating for users
May be difficult to understand or use for some users
Some CAPTCHA types don’t support all browsers
Some CAPTCHA types are not accessible to users who view a website using screen readers or assistive devices
Range of automated technologies, including APIs, browser plug-ins and extensions that enable attackers to bypass or solve CAPTCHA challenges

18
Q

What is a way of stopping brute force attacks

A

Lockout account after a defined number of incorrect authentication

19
Q

Why is locking out accounts not always the best solution

A

Because someone could easily abuse the security measure and lock out hundreds of user accounts

20
Q

What are sessions

A

An object that allows you to store information specific to a user(browser) from one request to the next

21
Q

What does a session persist across requests

A

A session persists state across requests

22
Q

What form can a session take

A

A client side cookie or server side token

23
Q

What are users which arent logged in called?

A

Anonymous - no identity

24
Q

What is a web session

A

A series of adjoining or connected actions by a user on an individual web application within a given time frame

25
Q

What is any user interaction with a single web application recorded as?

A

A web session by the application server

26
Q

What do web applications use to respond to the user’s interactions during a web session?

A

A session ID associated with the user