2.2Identification and Authentication Flashcards
What is identification?
Makes a claim about about what or something is.
What is authentication?
Establishes whether this claim is true.
How is using an ATM an example of Authentication and identification?
Swiping your card provides identification, punching in your pin, authenticates that claim
T or F : a claim alone to identity is enough.
False: factors can change, including last name, if you get married physical characteristics, if you lose weight.
Why are spam emails happening so much at the rate of 80% of emails?
Because it’s difficult to authenticate emails that are sent and rarely happens
Why is falsifying identification such a threat?
Because with basic unauthenticated information, someone can open a line of credit easily.
What is authentication?
A set of methods used to establish whether a claim of identity is true.
What are the five factors of authentication?
- Something you know
- Something you are (biometrics)
- Something you have (identity card, bank card. Cell phone, bank card, **Security token to a mobile phone)
- Something you do (analyze your gait of keystroke speed) harder to replicate sometimes
What is multi factor authentication?
Using a combination of factors.
What is mutual authentication?
We’re both parties in a transaction authenticate each other. Relies on digital certificates.
If you don’t perform mutual authentication, what kind of attack do you leave yourself open to?
Man in the middle attack. This is because attacker only needs to authenticate between client and attacker. If it was mutual attacker would need to authenticate between both client and server.
If you don’t perform mutual authentication, what kind of attack do you leave yourself open to?
Man in the middle attack. This is because attacker only needs to authenticate between client and attacker. If it was mutual attacker would need to authenticate between both client and server.
What are three common identification and authentication methods?
- Passwords
- Biometrics
- Hardware tokens
What are three common identification and authentication methods?
- Passwords
- Biometrics
- Hardware tokens
What is processing characteristics of a fingerprint called?
Biometric minutiae
What seven factors are biometrics defined by?
acceptability, circumvention, collectibility, performance, permanence, Universality, uniqueness.
What are two ways to measure performance in a biometric system?
- False acceptance rate. (FAR)
- False rejection rate. (FRR)
What is circumvention?
Tricking a biometric identifier. example is the gummy finger where attacker copies a fingerprint and makes a mold of the fingerprint.