Chapter 2 Flashcards

1
Q

Who or what we claim to be

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The set of methods used to establish whether a claim of identity is true

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the half step between Identification and Authentication?

A

Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Username/Password/Pin are examples of what?

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ID Badges/Swipe Card/OTP are examples of what?

A

Something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fingerprint/Iris/Retina Scan are examples of what?

A

Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Geolocation is an example of what?

A

Where you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process where the session is authenticated on both ends than just one end. This event prevents man-in-the-middle attacks. Both the PC and Server authenticate each other before data is sent in either direction.

A

Mutual Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When the attacker inserts themselves into the traffic flow.

A

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most common form of Authentication

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When all possible combinations are used to guess a password (or retrieve an original message)

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Programs that store all of the users’ passwords with a master password

A

Password Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a user syncs passwords from different systems without a software application

A

Manual Password Synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication factors that use physical features

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Biometrics are designed by 7 features

A

Universality
Uniqueness
Permanence
Collectability
Performance
Acceptability
Circumvention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stipulates (demands) that we should be able to find our chosen biometric characteristic in the majority of people we expect to enroll in the system

A

Universality

17
Q

A measure of how different a particular characteristic is among individuals

A

Uniqueness

18
Q

Tests how well a characteristic resists change over time and with advancing age

A

Permanence

19
Q

Measures how easy it is to acquire a characteristic

A

Collectability

20
Q

A set of metrics that judge how well a given system functions

A

Performance

21
Q

A measure of how acceptable the particular characteristic is to the users of the system

A

Acceptability

22
Q

Describes how easy it is to trick a system by using a falsified biometric identifier

A

Circumvention

23
Q

Physical devices that generate a one-time password

A

Hardware Tokens (Often called Dongles)

24
Q

Applications that generate One Time Passwords

A

Software Tokens

25
Passwords that expire after a time frame or after one-time usage
One Time Passwords
26
Noting elements that appear at certain parts of an image
Minutiae
27
FAR
False Acceptance Rate
28
FRR
False Rejection Rate
29
Measures how often you accept a user who should be rejected
False Acceptance Rate (FAR)
30
Measures how often we reject a legitimate user
False Rejection Rate (FRR)
31
Also known as a False Negative
False Rejection Rate (FRR)
32
EER
Equal Error Rate