Chapter 13 Flashcards
What includes knowledge based authentication and cognitive passwords that only the user will know ?
Identity Proofing
How do you establish identity for a user as an HR person?
Through a passport, birth certificate, or driver’s license
What provides accountability ?
Identification
Authentication
Auditing
What happens after a user is identified in a system ?
Authentication
What happens after a user is authenticated by a system?
Authorization
What happens after a user is authorized by a system ?
Auditing
What are the three primary factors of authentication ?
Something you know, have, and are
What identifies the accuracy of a biometric method and shows where the FRR is equal to the FAR?
CER
What provisions users accounts on third party sites the first time the user logs onto the site and reduces admin workload.
JIT Provisioning
What helps prevent unauthorized access by closing unattended sessions ?
Session Management
What helps developers easily store usernames and passwords and retrieve them when a user revisits a website.
Credential Management
What NIST SP recommends users are only required to change their passwords if their current one is compromised ?
NIST SP 800-63B
What password control can prevent users from rotating between two passwords ?
Password History
What control can ensure users change their passwords regularly ?
Password Age
What is active and is always the entity that receives information about, or data from, the object.
Subject
What is always the entity that provides or hosts information or data?
Object
What type of token generates and displays onetime passwords that are synchronized with an authentication server ?
Synchronous Tokens
What token uses a challenge response process to generate the onetime password?
Asynchronous
What does a lower CER indicate ?
A higher quality biometric device
What does a higher CER indicate ?
A less accurate biometric device
What is also called a Type I error and occurs when an authentication doesn’t recognize a valid subject.
False Rejection
What is also called a Type II error and occurs when an authentication system incorrectly recognizes an invalid subject.
False Acceptance
What are the fingerprint details/features?
Ridges
Bifurcations
Whorls
What are required to support accountability ?
Identification
Authentication