authentication Flashcards

1
Q

authentication

A

identifies a global or local identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

eg global id

A

passport number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

e.g. local id

A

student number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authentication factors

A

what the user knows, is and has
allows you to prove your identity to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

knowledge based authentication

A

have to share information with the authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are some examples of knowledge based authentication

A

passwords
pins
pass phrase
personal data
word association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is an alternative to textual passwords

A

graphical passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

graphical passwords

A

interacting with images
e.g. passmap or unlock patterns
can select images draw on an image or select parts of an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

advantages of knowledge based authentication

A

cheap
easily revoked
widely used and accepted by users
high security potential (long passwords harder to remember)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

disadvantages of knowledge based authentication

A

user accountability
no privilege control once shared
not aware when leaked
password may be leaked to an untrustworthy host
eavesdropping and illicit capture
can be captured by a masquerade/phishing company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how are textual passwords cracked

A

determine which hash function has been used
decide which attempt to use (brute force/ dictionary attack)
acquire recourses (brute force requires a storage device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

in what context do we use brute force for textual password cracking

A

to attempts all possible combinations for a particular account
may take many years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

in what context do we use dictionary attacks for textual password cracking

A

checks most likely passwords for many accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how do we crack graphical passwords

A

using brute force as there’s a limited password space
can use smudge attacks from the touch screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the benefits of using one time passwords

A

not reused so phishing and eavesdropping isn’t possible
most require access to another device that only the user has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the 3 forms of possession based authentication (user has )

A

magnetic strip card
smart cards
one shot password token

17
Q

smart card

A

secure storage of data
contents cant be modified or copied without authorisation
has processing and data storage capabilities due to the imbedded processor (computer chip)

18
Q

magnetic strip card

A

contains identification information and a signature on the back
mostly used by banking systems

19
Q

magnetic strip card positives

A

universally accepted
cheap to produce

20
Q

magnetic strip card negatives

A

limited security and functionality as they’re easy to counterfit

21
Q

what are the two methods of using one shot password tokens

A

synchronised password
challenge response system

22
Q

synchronised password (tokens)

A

a synchronised password generator produces the same sequence of random passwords in a token and host

23
Q

what is the process behind synchronised password tokens

A

the user needs to put the correct pin into the token to display the otp
the system clock is included in the algorithm to calculate the otp ensuring time sensitivity and uniqueness
the user can now input the otp to authenticate
failure if there’s a loss of synchronisation between the clocks

24
Q

challenge response system (tokens)

A

one party presents a challenge and the other must provide a valid answer

25
what is the process behind challenge response system
the user and system have a secret key the user logs on and the host generates a random number (challenge) and displays it the user enter their pin into the token followed by the challenge the response is computed as a cryptographic one way function using the secret key and pin which is displayed on the token the user puts the response into the terminal the host creates its own function based on the key and pin stored with the users id and if they match then the user is granted access
26
benefits of possession based authentication (user has )
attacker must have the token users cant share the token token can be combined with other methods e.g. otp aware of if the token has been lost and must report it illegal token possession is evidence
27
disadvantages of possession based authentication (user has )
cost of the token plus the reading and checking mechanism admin work; distributing, recording, lost token reporting, destruction, replacement of expired tokens
28
biometric based authentication (user is)
biometrics; automated methods of verifying and recognising a person based on physical and behavioural characheristics
29
examples of physical biometrics
measurements from the human body fingerprint/face/iris/retina recognition
30
examples of behavioural biometrics
measurements from actions voice/signature recognition keystroke/touch dynamics