Chapter 2 Flashcards
Who or what we claim to be
Identification
The set of methods used to establish whether a claim of identity is true
Authentication
What is the half step between Identification and Authentication?
Identity Verification
Username/Password/Pin are examples of what?
Something you know
ID Badges/Swipe Card/OTP are examples of what?
Something you have
Fingerprint/Iris/Retina Scan are examples of what?
Something you are
Geolocation is an example of what?
Where you are
The process where the session is authenticated on both ends than just one end. This event prevents man-in-the-middle attacks. Both the PC and Server authenticate each other before data is sent in either direction.
Mutual Authentication
When the attacker inserts themselves into the traffic flow.
Man-in-the-middle
What is the most common form of Authentication
Passwords
When all possible combinations are used to guess a password (or retrieve an original message)
Brute Force
Programs that store all of the users’ passwords with a master password
Password Manager
When a user syncs passwords from different systems without a software application
Manual Password Synchronization
Authentication factors that use physical features
Biometrics
Biometrics are designed by 7 features
Universality
Uniqueness
Permanence
Collectability
Performance
Acceptability
Circumvention
Stipulates (demands) that we should be able to find our chosen biometric characteristic in the majority of people we expect to enroll in the system
Universality
A measure of how different a particular characteristic is among individuals
Uniqueness
Tests how well a characteristic resists change over time and with advancing age
Permanence
Measures how easy it is to acquire a characteristic
Collectability
A set of metrics that judge how well a given system functions
Performance
A measure of how acceptable the particular characteristic is to the users of the system
Acceptability
Describes how easy it is to trick a system by using a falsified biometric identifier
Circumvention
Physical devices that generate a one-time password
Hardware Tokens (Often called Dongles)
Applications that generate One Time Passwords
Software Tokens
Passwords that expire after a time frame or after one-time usage
One Time Passwords
Noting elements that appear at certain parts of an image
Minutiae
FAR
False Acceptance Rate
FRR
False Rejection Rate
Measures how often you accept a user who should be rejected
False Acceptance Rate (FAR)
Measures how often we reject a legitimate user
False Rejection Rate (FRR)
Also known as a False Negative
False Rejection Rate (FRR)
EER
Equal Error Rate