Chapter 16: Identity and Access Fundamentals Flashcards
identification claim
username, account number, email address
authentication information
password
authorization
determines if a subject is given rights to carry out requested actions
three main types of factors for authentication
something a person knows (password), something a person has (token), something a person is (fingerprint)
two additional factors
somewhere a person is (geolocation), something a person does (keystroke behavior)
salts
random values added to plaintext passwords prior to hashing to add complexity and randomness
cognitive passwords
fact or opinion based questions, typically based on life experiences, used to verify an individual’s identity
Type I biometric authentication error
a legitimate individual is denied access
Type II error
an impostor granted access
CER
crossover error rate
crossover error rate of a biometric authentication system
the point at which the false rejection rate (Type I errors) is equal to the false acceptance rate (Type II errors)
ownership-based authentication
something a person owns, such as a token device
token device
password generator
password generator
token device; handheld device with a display synchronized with an authentication server and displays to the user a one-time password
OTP
one-time password
synchronous token device
requires the device and authentication service to advance to the next OTP in sync with each other
asynchronous token device
requires a challenge/response scheme to authentication the user