4 - Authentication Flashcards

1
Q

FAR, FRR importance

A

False acceptance rate - non identifiable user can authenticate

False rejection rate - identified user can’t authenticate

Importance - ERR (equal error rate) when FAR = FRR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Methods of authentication

A

Something a user:

Knows -
Pros: can be used if user forgets password
Cons: bad memory, can’t be changed if compromised, can be used multiple times
Has -
Pros: keys can be generated on command
Cons: devices being lost, one time pass can be intercepted, users don’t authenticate who is asking for 2f
Is -
Pros: can’t lose what you are (physical or behavioral)
Cons: fallback needed, privacy concerns, spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Password hashing and attacks

A

Hashing - scrambled representation of password

Attacks - can be brute forced! Hashing helps if PW is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trusted path

A

We have a trusted way to authenticate with OS

Network auth introduces new problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly