Week 8 Flashcards

(24 cards)

1
Q

What is authentication?

A

Proving someone or something is who/what it claims to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is identification?

A

Finding out who someone is without them claiming an identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three main authentication factors?

A

What you know (e.g., password)
What you have (e.g., card)
What you are (e.g., fingerprint)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Many people are confused by the different terms used. Among them,
the following two pairs of terms caused the most confusion:
authentication and identification; authentication and authorisation.
Explain the differences between these two pairs of terms.

A

Identification is the process of claiming an identity. It answers the question: “Who are you?”
Example: When you enter a username or show an ID card, you’re identifying yourself.
Authentication is the process of proving that identity. It answers the question: “Can you prove it?”
Example: When you enter your password, provide a fingerprint, or scan a smart card, you’re authenticating yourself.
🔑 Key difference:
Identification is just stating who you are; authentication is proving it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is hashing used for passwords?

A

To protect passwords if the server is hacked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a salted hash?

A

A password plus a random value hashed together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is MFA?

A

Using 2 or more authentication methods together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why use MFA?

A

It’s more secure than using just one method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is context-based authentication?

A

Based on where you are or your environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is risk-based authentication?

A

Changes based on how risky the login looks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What helps users manage passwords?

A

Password managers and password checkers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is “what you have”?

A

A card, token, or device you carry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is biometric authentication?

A

Uses body traits like fingerprints or iris scans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a risk of biometrics?

A

Can’t be easily changed if stolen or spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are non-user entities that need authentication?

A

Devices, messages, servers, software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is access control?

A

Controlling who can use or see something.

16
Q

What are the two steps in access control?

A

Authentication and authorisation.

17
Q

What is authorisation?

A

Deciding what an authenticated person can do.

18
Q

What is DAC (Discretionary Access Control)?

A

The object owner decides who gets access.

19
Q

What is MAC (Mandatory Access Control)?

A

A central authority controls access rules.

20
Q

What is RBAC (Role-Based Access Control)?

A

Access depends on your role (e.g., admin, user).

21
Q

What is ABAC (Attribute-Based Access Control)?

A

Access based on personal traits (e.g., age).

22
Q

What is identity management?

A

Managing digital identities over time.

23
Q

Why is IdM important?

A

It helps with authentication, authorisation, and tracking users.