ch 11 Flashcards

1
Q

what are the type of authenticating credentials

A
Where you are 
What you have 
What you are  
What you know
What you do
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the biggest weakness to passwords

A

human memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Attacks that can be used to discover passwords:

A

• Attacks on Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing, shoulder surfing, dumpster diving

A

-Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keylogger, protocol analyzer

Man-in-the-middle and replay attacks

A

Capturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attacker gains physical access to computer and resets password

A

-Resetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Method used by most password attacks today
Attackers steal file of password digests
Compare with their own digests they have created

A

-Offline attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Every possible combination of letters, numbers, and characters used to create encrypted passwords and matched against stolen file
Slowest, most thorough method

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(N T L M)

A

New Technology LAN Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what kind of attack is when An attacker who can steal the digest of an N T L M password would not need to try to break it
He would simply pretend to be the user and send that hash to the remote system to then be authenticated

A

Known as a pass the hash attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A more targeted brute force attack that uses placeholders for characters in certain positions of the password

A

Mask Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Conducts a statistical analysis on the stolen passwords that is used to create a mask to break the largest number of passwords

A

Rule Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacker creates digests of common dictionary words

Compares against stolen digest file

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two key stretching algorithms

A

bcrypt and P B K D F 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a user is using more than one type of authentication credential

A

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Using just oneMost common items used for authentication

A

Single-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(O T P)

A

Used to create a one-time password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Authentication code that can be used only once or for a limited period of time

A

one-time password (O T P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

where is the hardware token generally

A

Typically a small device with a window display

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

where is the software token generally stored

A

Stored on a general-purpose device like a laptop computer or smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(T O T P)

A

Time-based one-time password

22
Q

(H O T P)

A

HMAC-based one-time password

23
Q

Two types of O T P s

A

Time-based one-time password (T O T P)

HMAC-based one-time password (H O T P)

24
Q

(P I V)

A

Personal Identity Verification

25
The smart card standard covering all U.S. government employees
Personal Identity Verification (P I V)
26
what is a Contact card
``` a “pad” that allows electronic access to chip contents Contactless cards (proximity cards) ```
27
Uses a person’s unique physical characteristics for authentication Face, hand, or eye characteristics are used to authenticate
Standard biometrics
28
Retinal scanner uses the human retina as a biometric identifier Maps the unique patterns of a retina by directing a beam of low-energy infrared light (I R) into a person’s eye
Specialized Biometric Scanners
29
what fingerprint scanner takes a picture and compares with image on file
Static fingerprint scanner
30
what fingerprint scanner uses a small slit or opening
Dynamic fingerprint scanner
31
Voice recognition uses a standard computer microphone to identify users based on the unique characteristics of a person’s voice
Standard Input Devices
32
Biometric Disadvantages
``` Cost of hardware scanning devices Readers have some amount of error Reject authorized users Accept unauthorized users Biometric systems can be “tricked ```
33
(FAR)
False acceptance rate
34
(FRR)
False rejection Rate
35
- what is it called when someone else can log into your device
(FAR) False acceptance rate
36
what is it called when a user cannot log into their own device
(FRR) False rejection Rate
37
(CER)
crossover error rate
38
what is it called when nhow often FAR and FRR happen
(CER) crossover error rate
39
Relates to perception, thought process, and understanding of the user Easier for user to remember because it is based on user’s life experiences Difficult for an attacker to imitate
Cognitive biometrics
40
(PGA)
Picture password/Picture Gesture Authentication
41
Users select a picture to use for which there should be at least 10 “points of interest” that could serve as “landmarks” or places to touch
(PGA) Picture password/Picture Gesture Authentication
42
Authenticates by normal actions the user performs Keystroke dynamics Attempts to recognize user’s typing rhythm
Behavioral biometrics
43
time it takes to press and release a key
Dwell time
44
time between keystrokes
Flight time
45
The identification of the location of a person or object using technology
• Geolocation
46
(FIM)
federated identity management
47
Using a single authentication credential shared across multiple networks
federated identity management (FIM)
48
(S S O)
Single sign-on (S S O)
49
Examples of popular S S O s:
OAuth (used the most), Open ID Connect, and Shibboleth
50
Microsoft Windows group password settings Password Policy Settings Account Lockout Policy is managed by what?
assign privileges by group (group policy)
51
A two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory Forest
• Transitive trust