Lecture 7 Flashcards
(86 cards)
What are the two types of authentication in multifactor authentication (MFA)?
What a user knows and what a user has.
Fill in the blank: Passwords are the most common type of IT _______.
[authentication]
What are the weaknesses associated with passwords?
- Weak human memory
- Limited number of items memorized
- Difficulty in memorizing long, complex passwords
- Requirement for unique passwords across accounts
True or False: Passwords should be simple and easy to remember.
False
What is password spraying?
An attack that selects one or a few common passwords and enters the same password for multiple user accounts.
What is a brute force attack?
An attack method where every possible combination of characters is tried against a stolen hash file.
What is the difference between online and offline brute force attacks?
- Online: Continuously attacks the same account
- Offline: Uses a stolen hash file
Describe a rule attack.
Analyzes stolen passwords to create a mask that can crack the largest number of passwords.
What is a dictionary attack?
An attack that compares digests of common dictionary words against a stolen digest file.
What are rainbow tables?
Pregenerated data sets of candidate digests that can be used repeatedly and are faster than dictionary attacks.
What is multifactor authentication (MFA)?
Authentication using more than one type of authentication credential.
What is a smart card?
A card that holds information used as part of the authentication process.
What does OTP stand for in security contexts?
[One-Time Password]
What are the two types of one-time passwords (OTPs)?
- Time-based one-time password (TOTP)
- HMAC-based one-time password (HOTP)
List some unique physical characteristics used in physiological biometrics.
- Fingerprints
- Retina patterns
- Vein structure
- Gait
- Voice characteristics
- Iris patterns
- Facial landmarks
What are the disadvantages of biometric systems?
- Cost of specialized hardware
- False acceptance and rejection rates
- Potential for being tricked
- Privacy concerns
What is cognitive biometrics?
Authentication based on perception, thought processes, and understanding of the user.
What is keystroke dynamics?
A type of behavioral biometrics that recognizes a user’s typing rhythm.
What is the role of salts in password security?
A random string added to a password before hashing to slow down dictionary and brute force attacks.
What is key stretching?
A method that makes password hash algorithms intentionally slower to enhance security.
What is Single Sign-On (SSO)?
Using one authentication credential to access multiple accounts or applications.
What is RADIUS?
Remote Authentication Dial In User Service, an industry standard for remote dial-in access to a corporate network.
What does SAML stand for?
[Security Assertion Markup Language]
What is the Extensible Authentication Protocol (EAP)?
A framework for transporting authentication protocols, designed to be more secure than previous methods.