2.2Identification and Authentication Flashcards

1
Q

What is identification?

A

Makes a claim about about what or something is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is authentication?

A

Establishes whether this claim is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is using an ATM an example of Authentication and identification?

A

Swiping your card provides identification, punching in your pin, authenticates that claim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T or F : a claim alone to identity is enough.

A

False: factors can change, including last name, if you get married physical characteristics, if you lose weight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are spam emails happening so much at the rate of 80% of emails?

A

Because it’s difficult to authenticate emails that are sent and rarely happens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is falsifying identification such a threat?

A

Because with basic unauthenticated information, someone can open a line of credit easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is authentication?

A

A set of methods used to establish whether a claim of identity is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five factors of authentication?

A
  1. Something you know
  2. Something you are (biometrics)
  3. Something you have (identity card, bank card. Cell phone, bank card, **Security token to a mobile phone)
  4. Something you do (analyze your gait of keystroke speed) harder to replicate sometimes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is multi factor authentication?

A

Using a combination of factors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is mutual authentication?

A

We’re both parties in a transaction authenticate each other. Relies on digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you don’t perform mutual authentication, what kind of attack do you leave yourself open to?

A

Man in the middle attack. This is because attacker only needs to authenticate between client and attacker. If it was mutual attacker would need to authenticate between both client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If you don’t perform mutual authentication, what kind of attack do you leave yourself open to?

A

Man in the middle attack. This is because attacker only needs to authenticate between client and attacker. If it was mutual attacker would need to authenticate between both client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are three common identification and authentication methods?

A
  1. Passwords
  2. Biometrics
  3. Hardware tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three common identification and authentication methods?

A
  1. Passwords
  2. Biometrics
  3. Hardware tokens
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is processing characteristics of a fingerprint called?

A

Biometric minutiae

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What seven factors are biometrics defined by?

A

acceptability, circumvention, collectibility, performance, permanence, Universality, uniqueness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are two ways to measure performance in a biometric system?

A
  1. False acceptance rate. (FAR)
  2. False rejection rate. (FRR)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is circumvention?

A

Tricking a biometric identifier. example is the gummy finger where attacker copies a fingerprint and makes a mold of the fingerprint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What measures how many times a user is accepted who should be rejected? What is this also known as?

A

False acceptance rate. Also known as false positive.

20
Q

What measures how often we reject a legitimate user?

A

False negative

21
Q

What is the equal error rate? Or EER

A

It is the intersection of the False acceptance rate in the false rejection rate.

22
Q

What is the difference between verification and authentication of an identity?

A

Verification is claiming to be someone by presenting an identity in some way. Authentication is presenting a factor to prove the identity is true.

23
Q

How do you measure the rate at which you fail to authenticate legitimate users in a biometric system?

A

-Through an FRR system. This is called a false negative.

24
Q

A key would be described as which type of authentication factor?

A

Something you have.

25
Q

What do you call the process in which the client authenticates to the server and the server authenticates to the client?

A

-Mutual authentication

26
Q

What biometric factor describes how well a characteristic resists change over time?

A

Permanence

27
Q

If you’re using an eight-character password that contains only lowercase characters, would increasing the length to ten characters represent any significant increase in strength? Why or why not?

A

Not significant. Key is to make the password more complex by using different cases, and special characters and numbers.

28
Q

Name three reasons why an identity card alone might not make an ideal method of authentication.

A

Easy to replicate, photo of person can age. You can authenticate the ID, however it dosent really confirm who the person is standing infront of you.

29
Q

What factors might you use when implementing a multifactor authentication scheme for users who are logging onto workstations that are in a secure environment and are used by more than one person?

A

Something you have, ID, Something you know, password, Where you are – inside a secure environment.

30
Q

If you’re developing a multifactor authentication system for an environment where you might find larger-than-average numbers of disabled or injured users, such as a hospital, which authentication factors might you want to use or avoid?

A

Probably avoid biometric, something you are. Lean more on something you have such as a ID or tolken or key.

31
Q

__________ and ________are key concepts in security measures. They are fundamental to developing effective security mechanisms and infrastructures.

A

Identification and authentication

32
Q

Showing ID is _________, not _________. This distinction is crucial in understanding security processes.

A

verification, authentication

33
Q

Methods of _________ can be falsified. This vulnerability underscores the need for robust authentication processes.

A

identification

34
Q

“__________” factor is based on physical possessions or logical concepts. It uses tangible or digital items for authentication.

A

Something you have

35
Q

Password ______ involves not writing down passwords and using password managers. These practices enhance password security.

A

hygiene

36
Q

_______ __________ across multiple systems poses risks. Using the same password everywhere increases vulnerability.

A

Password synchronization

37
Q

_________ in biometrics means the chosen characteristic should be found in most people. It ensures broad applicability of the biometric system.

A

Universality

38
Q

____in biometrics measures how distinct a characteristic is among individuals. It’s crucial for accurate identification.

A

Uniqueness

39
Q

_______ in biometrics refers to how well a characteristic resists change over time. It ensures long-term reliability of the biometric identifier.

A

Permanence

40
Q

___ _____ ____ is the balance point between FAR and FRR. It’s used to assess overall system performance.

A

Equal error rate (EER)

41
Q

Common flaws in biometric systems include what?

A

Common flaws in biometric systems include ease of forgery and finite nature of identifiers. These limitations affect system reliability.

42
Q

Privacy issues in biometrics concern what?

A

giving away copies of biometric identifiers. This raises ethical and security concerns.

43
Q

_____ _____ are small devices containing certificates or unique identifiers. They provide a physical component to authentication.

A

Hardware tokens

44
Q

Hardware token security varies; simplest represent only “something you have,” more sophisticated can include other factors. Their effectiveness depends on ______ ____

A

design complexity.

45
Q

What is the difference between verification and authentication of an identity?

A
46
Q

What is the difference between verification and authentication of an identity?

A