lecture 7a Flashcards

(49 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is “Somewhere you are” in types of authentication credentials?

A

Restricted location for example a restricted military base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does “Something you are” mean in authentication?

A

Unique biological characteristic that cannot be changed like a fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of “Something you have” as an authentication credential?

A

Possession of an item nobody else has like Rikers RFID card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does “Someone you know” authentication involve?

A

Validated by another person for example Li knows Peyton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does “Something you exhibit” refer to in authentication?

A

Genetically determined characteristic like Peytons flaming red hair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is meant by “Something you can do” in authentication?

A

Performing an activity that cannot be exactly copied like Paulos signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is “Something you know” in authentication credentials?

A

Knowledge that nobody else possesses like a combination to unlock a locker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most common type of IT authentication today?

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why are passwords considered weak protection?

A

Because they rely on human memory which is limited and users often create weak passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What makes a password strong?

A

Being long complex and unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is password spraying?

A

An attack using a few common passwords against many user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a brute force attack?

A

Trying every possible password combination against encrypted password files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a rule attack on passwords?

A

Using statistical analysis of stolen passwords to create masks that crack many passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a dictionary attack?

A

Comparing digests of common dictionary words against stolen password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What advantage do rainbow tables have in password attacks?

A

They are faster than dictionary attacks use less memory and can be reused

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are password collections?

A

Large stolen datasets of real user passwords used for cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is multifactor authentication MFA?

A

Using more than one type of authentication credential for login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is two-factor authentication 2FA?

A

Using exactly two types of authentication credentials together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a smart card in authentication?

A

A card with integrated chip barcode magnetic strip and picture used for access

21
Q

What is card cloning?

A

Unauthorized duplication of smart cards usually by skimming

22
Q

What is a windowed token?

A

A device that generates a one-time password OTP for limited time use

23
Q

What is a time-based one-time password TOTP?

A

A code generated by algorithm changing every 30 to 60 seconds

24
Q

What is an HMAC-based one-time password HOTP?

A

An event-driven code that changes when a specific event occurs

25
What is a security key in authentication?
A USB or Lightning dongle inserted or held near an endpoint for authentication
26
What is attestation in security keys?
A unique key pair burned into the device proving its authenticity
27
What are physiological biometrics?
Using unique physical characteristics of a person for authentication
28
Name two types of fingerprint scanners.
Static takes a picture and compares dynamic uses a slit to scan
29
What is a retinal scanner?
Uses low-energy infrared light to map unique retina patterns
30
What other biometrics can be used for authentication?
Vein scanning gait voice iris facial recognition
31
What is false acceptance rate FAR in biometrics?
Frequency imposters are incorrectly accepted as genuine users
32
What is false rejection rate FRR in biometrics?
Frequency legitimate users are incorrectly rejected
33
What is cognitive biometrics?
Authentication based on user perception thought and life experience
34
What is behavioural biometrics?
Authentication based on normal actions like typing rhythm
35
What two typing variables does keystroke dynamics use?
Dwell time time pressing key and flight time between keystrokes
36
What is the purpose of salts in password security?
Random string added to passwords before hashing to slow attacks
37
What is key stretching in password security?
Specialized hashing designed to be slow making password cracking harder
38
What is a password vault?
A secure repository or manager used to store and manage passwords
39
What is Single Sign-On SSO?
Using one authentication credential to access multiple accounts or applications
40
What is RADIUS in authentication?
Remote Authentication Dial In User Service a centralised authentication protocol
41
What is Kerberos authentication?
System using tickets that are encrypted and expire to securely authenticate users
42
What is TACACS+?
Cisco extension of TACACS providing full packet encryption for authentication
43
What is a directory service in networks?
Database storing user and device info to manage authentication and permissions
44
What is SAML?
Security Assertion Markup Language an XML standard for exchanging authentication data
45
What is Extensible Authentication Protocol EAP?
Framework transporting authentication protocols using request response success failure packets
46
What are the five categories of authentication credentials?
What you know what you have what you are what you do and where you are
47
Why do passwords provide weak protection?
Because they rely on human memory and are vulnerable to offline attacks
48
What is one way enterprises protect stored password digests?
Adding a random salt string to make attacks slower
49
What is one benefit of behavioural biometrics?
Requires no specialized hardware and authenticates based on user actions