Chapter 2 Flashcards
Who or what we claim to be
Identification
The set of methods used to establish whether a claim of identity is true
Authentication
What is the half step between Identification and Authentication?
Identity Verification
Username/Password/Pin are examples of what?
Something you know
ID Badges/Swipe Card/OTP are examples of what?
Something you have
Fingerprint/Iris/Retina Scan are examples of what?
Something you are
Geolocation is an example of what?
Where you are
The process where the session is authenticated on both ends than just one end. This event prevents man-in-the-middle attacks. Both the PC and Server authenticate each other before data is sent in either direction.
Mutual Authentication
When the attacker inserts themselves into the traffic flow.
Man-in-the-middle
What is the most common form of Authentication
Passwords
When all possible combinations are used to guess a password (or retrieve an original message)
Brute Force
Programs that store all of the users’ passwords with a master password
Password Manager
When a user syncs passwords from different systems without a software application
Manual Password Synchronization
Authentication factors that use physical features
Biometrics
Biometrics are designed by 7 features
Universality
Uniqueness
Permanence
Collectability
Performance
Acceptability
Circumvention