Lecture 7 Flashcards

(86 cards)

1
Q

What are the two types of authentication in multifactor authentication (MFA)?

A

What a user knows and what a user has.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill in the blank: Passwords are the most common type of IT _______.

A

[authentication]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the weaknesses associated with passwords?

A
  • Weak human memory
  • Limited number of items memorized
  • Difficulty in memorizing long, complex passwords
  • Requirement for unique passwords across accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Passwords should be simple and easy to remember.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is password spraying?

A

An attack that selects one or a few common passwords and enters the same password for multiple user accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a brute force attack?

A

An attack method where every possible combination of characters is tried against a stolen hash file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between online and offline brute force attacks?

A
  • Online: Continuously attacks the same account
  • Offline: Uses a stolen hash file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe a rule attack.

A

Analyzes stolen passwords to create a mask that can crack the largest number of passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a dictionary attack?

A

An attack that compares digests of common dictionary words against a stolen digest file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are rainbow tables?

A

Pregenerated data sets of candidate digests that can be used repeatedly and are faster than dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is multifactor authentication (MFA)?

A

Authentication using more than one type of authentication credential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a smart card?

A

A card that holds information used as part of the authentication process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does OTP stand for in security contexts?

A

[One-Time Password]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two types of one-time passwords (OTPs)?

A
  • Time-based one-time password (TOTP)
  • HMAC-based one-time password (HOTP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List some unique physical characteristics used in physiological biometrics.

A
  • Fingerprints
  • Retina patterns
  • Vein structure
  • Gait
  • Voice characteristics
  • Iris patterns
  • Facial landmarks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the disadvantages of biometric systems?

A
  • Cost of specialized hardware
  • False acceptance and rejection rates
  • Potential for being tricked
  • Privacy concerns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is cognitive biometrics?

A

Authentication based on perception, thought processes, and understanding of the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is keystroke dynamics?

A

A type of behavioral biometrics that recognizes a user’s typing rhythm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the role of salts in password security?

A

A random string added to a password before hashing to slow down dictionary and brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is key stretching?

A

A method that makes password hash algorithms intentionally slower to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Single Sign-On (SSO)?

A

Using one authentication credential to access multiple accounts or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is RADIUS?

A

Remote Authentication Dial In User Service, an industry standard for remote dial-in access to a corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does SAML stand for?

A

[Security Assertion Markup Language]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Extensible Authentication Protocol (EAP)?

A

A framework for transporting authentication protocols, designed to be more secure than previous methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the Extensible Authentication Protocol (EAP)?
A framework for transporting authentication protocols.
26
What protocols did EAP serve as a more secure alternative to?
* Challenge-Handshake Authentication Protocol (CHAP) * Microsoft version of CHAP (MS-CHAP) * Password Authentication Protocol (PAP)
27
What types of packets does EAP define?
* Request * Response * Success * Failure
28
How many categories can authentication credentials be classified into?
Five categories.
29
List the five categories of authentication credentials.
* What you know * What you have * What you are * What you do * Where you are
30
Why do passwords provide weak protection?
They rely on human memory.
31
What type of attacks do most password attacks today use?
Offline attacks.
32
What is a dictionary attack?
An attack that begins with creating digests of common dictionary words compared with those in a stolen password file.
33
What is a hardware token?
A small device that generates a code from an algorithm once every 30 to 60 seconds.
34
What does biometrics rely on for authentication?
The characteristics of an individual.
35
What are examples of biometrics?
* Standard biometrics * Cognitive biometrics
36
What does behavioral biometrics authenticate?
Normal actions the user performs.
37
What is a method for protecting stored digests?
Adding a salt.
38
What is a salt in the context of stored digests?
A random string used in hash algorithms.
39
What is single sign-on (SSO)?
A method that allows a single username and password to gain access to all accounts.
40
What can different services provide in terms of authentication?
Different methods of authentication.
41
What does the CIA triad stand for?
Confidentiality, Integrity, Availability
42
What are the major types of mobile devices?
* Tablets * Smartphones * Wearables * Portable computers * Web-based computers
43
What are common connectivity methods for mobile devices?
* Cellular * Wi-Fi * Infrared * USB connections
44
What does BYOD stand for?
Bring Your Own Device
45
What are the benefits of the BYOD model?
* Management flexibility * Cost savings * Increased employee performance * Simplified IT infrastructure * Reduced internal service
46
What are common mobile device vulnerabilities?
* Physical security risks * Limited updates * Location tracking * Unauthorized recording
47
Fill in the blank: Mobile devices can access untrusted content through _______.
SMS, MMS, QR codes
48
What is remote wiping?
Erasing sensitive data stored on a lost or stolen mobile device
49
What are the key features of mobile device management (MDM) tools?
* Remote management * Application management * Content management * Unified endpoint management
50
What is an embedded system?
Computer hardware and software contained within a larger system designed for a specific function
51
What are some examples of specialized systems?
* Digital smart meters * Medical systems * Aircraft systems * Industrial control systems
52
What is the Internet of Things (IoT)?
Connecting any device to the Internet for the purpose of sending and receiving data
53
True or False: A smart meter requires annual servicing to maintain accuracy.
False
54
What are the constraints that affect the security of embedded systems?
* Power limitations * Low processing capabilities * Lack of advanced security features in network protocols * Inability to patch vulnerabilities * Resource-intensive cryptography
55
What is a field-programmable gate array (FPGA)?
A hardware chip that can be programmed by the user to carry out one or more logical operations
56
What is the purpose of segment storage in mobile device security?
Separates business data from personal data to avoid privacy issues
57
Fill in the blank: The device can generate an alarm even if it is on _______.
mute
58
What is the role of Mobile Application Management (MAM)?
Managing application distribution and access control
59
What are the advantages of smart meters over analogue meters?
* Daily data transmission * Tamper alerts * Emergency communication capabilities
60
What is the function of a virtual desktop infrastructure (VDI)?
Stores sensitive applications and data on a remote server accessed through a smartphone
61
What is tethering in the context of mobile devices?
Using a mobile device with an active Internet connection to share that connection with other devices
62
What are small devices optimized for?
Very low levels of power ## Footnote This optimization limits their ability to perform strong security measures.
63
What is a limitation of small devices regarding processing capabilities?
Low processing capabilities restrict complex security measures ## Footnote This is due to their size.
64
What is the impact of simplified network protocols in device design?
Lack advanced security features ## Footnote This is done to simplify connecting devices to networks.
65
What are the resource requirements for cryptography?
Significant processing and storage capacities ## Footnote These are required for encryption and decryption tasks.
66
What is a common issue with device updates?
Few devices have the capacity for being updated ## Footnote This is critical for addressing exposed security vulnerabilities.
67
Why do most devices lack authentication features?
To keep costs at a minimum ## Footnote This is a common design choice among manufacturers.
68
What is a limitation of many devices regarding remote security updates?
Not all devices have long-range capabilities ## Footnote This restricts access to necessary updates.
69
What is the primary concern of most developers when creating devices?
Making products as inexpensive as possible ## Footnote This often results in the omission of security protections.
70
What does 'implied trust' mean in device design?
Assumes all other devices or users can be trusted ## Footnote This leads to the design of devices without security features.
71
What are examples of weak default credentials?
* Usernames: root, admin, support * Passwords: admin, 888888, default, 123456, 54321, password ## Footnote These are often simple and well known.
72
What have many industry-led initiatives attempted to address?
Security vulnerabilities in IoT and embedded devices ## Footnote However, these initiatives were scattered and not comprehensive.
73
What legislation was introduced in the U.S. Senate in May 2019?
The Internet of Things (IoT) Cybersecurity Improvement Act of 2019 ## Footnote This act aims to improve security on connected devices.
74
What did California and Oregon pass regarding IoT security?
State laws addressing IoT security ## Footnote These laws went into effect in January 2020.
75
What do the laws require for connected devices?
Equipped with reasonable security features ## Footnote This is appropriate for the nature and function of the device.
76
What are some types of mobile devices?
* Tablet computers * Smartphones * Wearable technology devices ## Footnote These are a few examples of mobile devices.
77
What is a characteristic of portable computers?
Resemble standard desktop computers ## Footnote They are designed for mobility.
78
What is cellular telephony used for?
Connecting mobile devices to networks ## Footnote It divides the coverage area into cells.
79
What does BYOD stand for?
Bring Your Own Device ## Footnote This allows users to use personal mobile devices for business purposes.
80
What is the CYOD model?
Choose Your Own Device ## Footnote Employees select from a limited list of approved devices.
81
What should users consider when setting up a mobile device?
Security ## Footnote Initial setup is crucial for protecting the device.
82
What do mobile device management (MDM) tools do?
Allow remote management of devices by an organization ## Footnote This is important for enterprise security.
83
What does mobile application management (MAM) cover?
Application management ## Footnote It focuses on managing applications on mobile devices.
84
What does a mobile content management (MCM) system provide?
Content management to mobile devices used by employees ## Footnote This is essential in enterprise environments.
85
How can embedded and specialized devices be classified?
Into several categories ## Footnote This classification helps in understanding their functions and security needs.
86
What is a significant issue regarding security in embedded systems?
Lacking security can result in a wide range of attacks ## Footnote This makes them vulnerable to exploitation.