authentication Flashcards

1
Q

authentication

A

identifies a global or local identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

eg global id

A

passport number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

e.g. local id

A

student number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

authentication factors

A

what the user knows, is and has
allows you to prove your identity to a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

knowledge based authentication

A

have to share information with the authentication system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are some examples of knowledge based authentication

A

passwords
pins
pass phrase
personal data
word association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is an alternative to textual passwords

A

graphical passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

graphical passwords

A

interacting with images
e.g. passmap or unlock patterns
can select images draw on an image or select parts of an image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

advantages of knowledge based authentication

A

cheap
easily revoked
widely used and accepted by users
high security potential (long passwords harder to remember)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

disadvantages of knowledge based authentication

A

user accountability
no privilege control once shared
not aware when leaked
password may be leaked to an untrustworthy host
eavesdropping and illicit capture
can be captured by a masquerade/phishing company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how are textual passwords cracked

A

determine which hash function has been used
decide which attempt to use (brute force/ dictionary attack)
acquire recourses (brute force requires a storage device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

in what context do we use brute force for textual password cracking

A

to attempts all possible combinations for a particular account
may take many years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

in what context do we use dictionary attacks for textual password cracking

A

checks most likely passwords for many accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how do we crack graphical passwords

A

using brute force as there’s a limited password space
can use smudge attacks from the touch screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the benefits of using one time passwords

A

not reused so phishing and eavesdropping isn’t possible
most require access to another device that only the user has

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the 3 forms of possession based authentication (user has )

A

magnetic strip card
smart cards
one shot password token

17
Q

smart card

A

secure storage of data
contents cant be modified or copied without authorisation
has processing and data storage capabilities due to the imbedded processor (computer chip)

18
Q

magnetic strip card

A

contains identification information and a signature on the back
mostly used by banking systems

19
Q

magnetic strip card positives

A

universally accepted
cheap to produce

20
Q

magnetic strip card negatives

A

limited security and functionality as they’re easy to counterfit

21
Q

what are the two methods of using one shot password tokens

A

synchronised password
challenge response system

22
Q

synchronised password (tokens)

A

a synchronised password generator produces the same sequence of random passwords in a token and host

23
Q

what is the process behind synchronised password tokens

A

the user needs to put the correct pin into the token to display the otp
the system clock is included in the algorithm to calculate the otp ensuring time sensitivity and uniqueness
the user can now input the otp to authenticate
failure if there’s a loss of synchronisation between the clocks

24
Q

challenge response system (tokens)

A

one party presents a challenge and the other must provide a valid answer

25
Q

what is the process behind challenge response system

A

the user and system have a secret key
the user logs on and the host generates a random number (challenge) and displays it
the user enter their pin into the token followed by the challenge
the response is computed as a cryptographic one way function using the secret key and pin which is displayed on the token
the user puts the response into the terminal
the host creates its own function based on the key and pin stored with the users id and if they match then the user is granted access

26
Q

benefits of possession based authentication (user has )

A

attacker must have the token
users cant share the token
token can be combined with other methods e.g. otp
aware of if the token has been lost and must report it
illegal token possession is evidence

27
Q

disadvantages of possession based authentication (user has )

A

cost of the token plus the reading and checking mechanism
admin work; distributing, recording, lost token reporting, destruction, replacement of expired tokens

28
Q

biometric based authentication (user is)

A

biometrics; automated methods of verifying and recognising a person based on physical and behavioural characheristics

29
Q

examples of physical biometrics

A

measurements from the human body
fingerprint/face/iris/retina recognition

30
Q

examples of behavioural biometrics

A

measurements from actions
voice/signature recognition
keystroke/touch dynamics