Chapter 2 Flashcards

1
Q

Who or what we claim to be

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The set of methods used to establish whether a claim of identity is true

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the half step between Identification and Authentication?

A

Identity Verification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Username/Password/Pin are examples of what?

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ID Badges/Swipe Card/OTP are examples of what?

A

Something you have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fingerprint/Iris/Retina Scan are examples of what?

A

Something you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Geolocation is an example of what?

A

Where you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The process where the session is authenticated on both ends than just one end. This event prevents man-in-the-middle attacks. Both the PC and Server authenticate each other before data is sent in either direction.

A

Mutual Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When the attacker inserts themselves into the traffic flow.

A

Man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the most common form of Authentication

A

Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When all possible combinations are used to guess a password (or retrieve an original message)

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Programs that store all of the users’ passwords with a master password

A

Password Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a user syncs passwords from different systems without a software application

A

Manual Password Synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication factors that use physical features

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Biometrics are designed by 7 features

A

Universality
Uniqueness
Permanence
Collectability
Performance
Acceptability
Circumvention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Stipulates (demands) that we should be able to find our chosen biometric characteristic in the majority of people we expect to enroll in the system

A

Universality

17
Q

A measure of how different a particular characteristic is among individuals

A

Uniqueness

18
Q

Tests how well a characteristic resists change over time and with advancing age

A

Permanence

19
Q

Measures how easy it is to acquire a characteristic

A

Collectability

20
Q

A set of metrics that judge how well a given system functions

A

Performance

21
Q

A measure of how acceptable the particular characteristic is to the users of the system

A

Acceptability

22
Q

Describes how easy it is to trick a system by using a falsified biometric identifier

A

Circumvention

23
Q

Physical devices that generate a one-time password

A

Hardware Tokens (Often called Dongles)

24
Q

Applications that generate One Time Passwords

A

Software Tokens

25
Q

Passwords that expire after a time frame or after one-time usage

A

One Time Passwords

26
Q

Noting elements that appear at certain parts of an image

A

Minutiae

27
Q

FAR

A

False Acceptance Rate

28
Q

FRR

A

False Rejection Rate

29
Q

Measures how often you accept a user who should be rejected

A

False Acceptance Rate (FAR)

30
Q

Measures how often we reject a legitimate user

A

False Rejection Rate (FRR)

31
Q

Also known as a False Negative

A

False Rejection Rate (FRR)

32
Q

EER

A

Equal Error Rate