Authentication Flashcards

1
Q

Iris Recognition - Advantages

A
  • very high accuracy
  • short verification time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Iris Recognition - Disadvantages

A

-very expensive to install
-very intrusive
-uses alot of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Face Recognition - Advantages

A
  • non intrusive
  • relatively inexpensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Face Recognition- Disadvantages

A

-can be affected by lighting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Voice recognition- Advantages

A

-non intrusive
-short verification time
- inexpensive technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Voice recognition- Disadvantages

A

-a persons voice can easily recorded and used with unauthorized access
-low accuracy
-illness can cause voices to change leading to the method prevailing inefficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital certificates

A

a pair of files on the user’s computer these files ensure security when data is being sent over the internet.

made up of six parts:
-the sender’s email address
-the name of the digital certificate owner
-a serial number
-expiry date
-public key
-digital signature of certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure Socket Layer

A

A type of protocol which ensures that data is sent and received securely over the internet.
-online banking
-online shopping
-sending and receiving emails
-instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

it is used to protect data in case it has been hacked or accessed illegally, this doesn’t prevent hacking but instead makes the data meaningless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Process of encryption

A

encryption uses a secret key, when the key is applied the text becomes unreadable. only if the recipient has the same key the encrypted message will decode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewalls

A

can be a hardware or software, it sits between the user’s computer and the external network. It’s main function is to prevent destructive forces away from the user’s computer, it filters incoming and outgoing network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Tasks carried out by the firewall.

A

-filters the incoming and outgoing traffic between the user’s computer and the external network.
-checks whether network traffic meets the certain criteria.
-If criteria is not met, the firewall will block the traffic and send out an warning to the user
-criteria’s can be set so that firewalls can prevent access to undesirable sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two Factor Authentication

A

is a form of verification which needs two factor of verification to verify who the user is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ways passwords can be protected.

A

-create a strong password
-change passwords on a regular basis
-run anti spyware to ensure the password is not being relayed back to someone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly