Chapter 2: Toolbox: Authentication, Access Control, and Cryptography Flashcards

(73 cards)

1
Q

The act of asserting who a user is

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of proving that the asserted identity of a user is correct, that the user is who they say they are

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A list of the concealed forms of common passwords

A

Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An extra data field that is added to passwords as an extra piece to the encryption of passwords

A

A salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack in which the attacker tries all possible passwords, usually in some automated fashion

A

Exhaustive attack or brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An information gathering technique in which the attacker contacts the system administrator or the user to elicit the password or the information for how to obtain the password

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A tool that is used to save passwords and generate pseudo-randomly generated passwords

A

Password manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biological properties based on some physical characteristic of the user

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The error triggered when authentication is confirmed when it should have been denied

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The error triggered when authentication is denied when it should have been confirmed

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the set of rules that determines when a positive test means a positive result

A

The Reference Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tp/(tp + fp)

TP = True Positive
FP = False Positive

A

The formula for calculating the positive predictive value of a given screening test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

tn/(fn + tn)

TN = True Negative
FN = False Negative

A

The formula for calculating the negative predictive value of a screening test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The proportion of positive results among all possible correct matches for a screening test

A

Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The proportion of negative results among all possible options that are not sought for a screening test

A

Specificity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tp/(tp + fn)

TP = True Positive
FN = False Negative

A

The formula for calculating sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

tn/(fp + tn)

TN = True Negative
FP = False Positive

A

The formula for calculating specificity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The measure of the degree to which a screening test correctly flags a condition or situation

A

Accuracy or efficacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(tp + tn)/(tp + fp + fn + tn)

TP = True Positive
TN = True Negative
FP = False Positive
FN = False Negative

A

The formula for calculating accuracy or efficacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The measurement of how common a given condition or situation is in a screening test

A

Prevalence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(tp + fn)/(tp + fp + fn + tn)

TP = True Positive
FN = False Negative
FP = False Positive
TN = True Negative

A

The formula for calculating prevalence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A graphical representation of the trade-off between false negative and false positive rates for a screening test; The X-axis is usually represented by the specificity and the Y-axis is usually represented by the sensitivity

A

A receiver operating characteristic (ROC) curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A pair of data items sent to a visiting user’s web browser by the visited website; consists of a key and a value, designed to represent the current state of a session between the user and the website

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A security token that does not actively do anything on its own; A security token on which the contents never change

A

Passive token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A security token that has no computing power on its own and has some variability or interaction with its surroundings; A security token on which the contents can and do change
Active token
26
A security token on which the value remains fixed
Static token
27
A security token that has computing power and on which the values can and do change
Dynamic token
28
The attack method of using a device to copy authentication data surreptitiously from an authentication token and relay that data to an attacker
Skimming
29
A union of separate identification and authentication systems
A federated identity management scheme
30
Combining authentication schemes for stronger security
Multifactor authentication
31
The guideline that states a subject should have access to the smallest number of objects necessary to perform their tasks
Principle of least privilege
32
The fineness or specificity of access control
Granularity
33
A record of which subjects have been permitted what kind of access to which objects when
Audit log
34
The act of restraining users and processes so that any harm they can do is contained in some way
Limited privilege
35
Access control that is always invoked, tamperproof, and verifiable
Reference monitor
36
The problem that occurs when access to a given object is provided to a given subject that should not have access to that object
Propagation of access rights
37
A representation of access rights in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object
Access control matrix
38
A representation of access rights in which all of the subjects that have access to a particular object are described, as well as what those subjects' level of access to that object are; corresponds to the columns of the access control matrix
Access control list
39
The representation of a given subject's access rights to all objects on a system; corresponds to the rows of the access control matrix
Privilege list or directory
40
An unforgeable token that gives the possessor certain rights to an object; represented as an access control triple of subject, object, and right
Capability
41
The access right that provides a subject with the ability to pass copies of capabilities to other subjects
Transfer or propagate
42
The collection of objects to which a given process has access
Domain
43
The use of a procedure to control access to objects
Procedure-oriented protection
44
The association of privileges with groups of users that perform similar functions
Role-based access control
45
The process of encoding a message so that its meaning is not obvious
Encryption
46
The process of decoding a message to make its meaning obvious
Decryption
47
The process of translating whole words or phrases into other words or phrases
Encoding
48
The process of translating individual characters
Enciphering
49
The form of a message that is able to be read and understood
Plaintext
50
The encrypted form of a message
Ciphertext
51
C = E(P) C = Ciphertext E = Encryption rule P = Plaintext
The formal notation for the transformation of plaintext into ciphertext
52
P = D(C) P = Plaintext D = Decryption rule C = Ciphertext
The formal notation for the transformation of ciphertext into plaintext
53
P = D(E(P)) P = Plaintext D = Decryption rule E = Encryption rule
The formal notation for a complete cryptosystem
54
A value used by encryption and decryption algorithms that determines how to encryption/decrypt a given message
Key
55
The form of encryption in which both the encryption and decryption keys are the same; the same key used to encrypt is also used to decrypt
Symmetric key or secret key encryption
56
The form of encryption in which a pair of keys are used, one for encryption and the other for decryption; one key is public and the other is private, held by the sender of ciphertext
Asymmetric key or public key encryption
57
An encryption scheme in which a key is not required
Keyless cipher
58
A person that studies encryption and encrypted messages for defensive purposes, making sure the codes and ciphers are solid enough to protect data adequately; they tend to work on behalf of unauthorized interceptors
Cryptanalyst
59
A person that studies encryption and encrypted messages, usually on behalf of a legitimate sender or receiver
Cryptologist
60
The research into and study of encryption and decryption
Cryptology
61
The process of deducing the original meaning of ciphertext or determining the decryption algorithm for ciphertext
Breaking an encryption
62
The point at which an encryption algorithm can be determined, given enough time and data
Breakable
63
The difficulty of breaking an encryption
Work factor
64
Proof that data was not modified or fabricated by any subject other than the authorized subject
Authenticity
65
The property of symmetric encryption schemes that allows keys to be shared among users
Key distribution
66
The process of activating, storing, and safeguarding encryption keys
Key management
67
The encryption scheme in which data is encrypted as individual bits or bytes; think "encipher"
Stream encryption
68
The encryption scheme is which groups of plaintext characters are encrypted as a single block; think "encode"
Block encryption
69
The encryption algorithm that uses 64-bit blocks and a 56-bit key
The Data Encryption Standard (DES) algorithm
70
The encryption algorithm that uses two 56-bit keys, one to encrypt, the second to decrypt, and then encrypt again with the first key
Two-key triple DES
71
The encryption algorithm that uses three 56-bit keys, one to encrypt, the second to encrypt again or decrypt, and the third to encrypt again
Three-key triple DES
72
The encryption algorithm that uses 128 bit blocks and 10 rounds for 128 bit keys, 12 rounds for 192 bit keys, and 14 rounds for 256 bit keys
Rijndael or the Advanced Encryption System (AES)
73