Chapter 2: Toolbox: Authentication, Access Control, and Cryptography Flashcards
The act of asserting who a user is
Identification
The act of proving that the asserted identity of a user is correct, that the user is who they say they are
Authentication
A list of the concealed forms of common passwords
Rainbow table
An extra data field that is added to passwords as an extra piece to the encryption of passwords
A salt
An attack in which the attacker tries all possible passwords, usually in some automated fashion
Exhaustive attack or brute force attack
An information gathering technique in which the attacker contacts the system administrator or the user to elicit the password or the information for how to obtain the password
Social engineering
A tool that is used to save passwords and generate pseudo-randomly generated passwords
Password manager
Biological properties based on some physical characteristic of the user
Biometrics
The error triggered when authentication is confirmed when it should have been denied
False positive
The error triggered when authentication is denied when it should have been confirmed
False negative
the set of rules that determines when a positive test means a positive result
The Reference Standard
tp/(tp + fp)
TP = True Positive
FP = False Positive
The formula for calculating the positive predictive value of a given screening test
tn/(fn + tn)
TN = True Negative
FN = False Negative
The formula for calculating the negative predictive value of a screening test
The proportion of positive results among all possible correct matches for a screening test
Sensitivity
The proportion of negative results among all possible options that are not sought for a screening test
Specificity
tp/(tp + fn)
TP = True Positive
FN = False Negative
The formula for calculating sensitivity
tn/(fp + tn)
TN = True Negative
FP = False Positive
The formula for calculating specificity
The measure of the degree to which a screening test correctly flags a condition or situation
Accuracy or efficacy
(tp + tn)/(tp + fp + fn + tn)
TP = True Positive
TN = True Negative
FP = False Positive
FN = False Negative
The formula for calculating accuracy or efficacy
The measurement of how common a given condition or situation is in a screening test
Prevalence
(tp + fn)/(tp + fp + fn + tn)
TP = True Positive
FN = False Negative
FP = False Positive
TN = True Negative
The formula for calculating prevalence
A graphical representation of the trade-off between false negative and false positive rates for a screening test; The X-axis is usually represented by the specificity and the Y-axis is usually represented by the sensitivity
A receiver operating characteristic (ROC) curve
A pair of data items sent to a visiting user’s web browser by the visited website; consists of a key and a value, designed to represent the current state of a session between the user and the website
Cookie
A security token that does not actively do anything on its own; A security token on which the contents never change
Passive token
A security token that has no computing power on its own and has some variability or interaction with its surroundings; A security token on which the contents can and do change
Active token
A security token on which the value remains fixed
Static token
A security token that has computing power and on which the values can and do change
Dynamic token
The attack method of using a device to copy authentication data surreptitiously from an authentication token and relay that data to an attacker
Skimming
A union of separate identification and authentication systems
A federated identity management scheme