Chapter 2: Toolbox: Authentication, Access Control, and Cryptography Flashcards

1
Q

The act of asserting who a user is

A

Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The act of proving that the asserted identity of a user is correct, that the user is who they say they are

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A list of the concealed forms of common passwords

A

Rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An extra data field that is added to passwords as an extra piece to the encryption of passwords

A

A salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack in which the attacker tries all possible passwords, usually in some automated fashion

A

Exhaustive attack or brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An information gathering technique in which the attacker contacts the system administrator or the user to elicit the password or the information for how to obtain the password

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A tool that is used to save passwords and generate pseudo-randomly generated passwords

A

Password manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biological properties based on some physical characteristic of the user

A

Biometrics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The error triggered when authentication is confirmed when it should have been denied

A

False positive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The error triggered when authentication is denied when it should have been confirmed

A

False negative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the set of rules that determines when a positive test means a positive result

A

The Reference Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tp/(tp + fp)

TP = True Positive
FP = False Positive

A

The formula for calculating the positive predictive value of a given screening test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

tn/(fn + tn)

TN = True Negative
FN = False Negative

A

The formula for calculating the negative predictive value of a screening test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The proportion of positive results among all possible correct matches for a screening test

A

Sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The proportion of negative results among all possible options that are not sought for a screening test

A

Specificity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tp/(tp + fn)

TP = True Positive
FN = False Negative

A

The formula for calculating sensitivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

tn/(fp + tn)

TN = True Negative
FP = False Positive

A

The formula for calculating specificity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The measure of the degree to which a screening test correctly flags a condition or situation

A

Accuracy or efficacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(tp + tn)/(tp + fp + fn + tn)

TP = True Positive
TN = True Negative
FP = False Positive
FN = False Negative

A

The formula for calculating accuracy or efficacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The measurement of how common a given condition or situation is in a screening test

A

Prevalence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(tp + fn)/(tp + fp + fn + tn)

TP = True Positive
FN = False Negative
FP = False Positive
TN = True Negative

A

The formula for calculating prevalence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A graphical representation of the trade-off between false negative and false positive rates for a screening test; The X-axis is usually represented by the specificity and the Y-axis is usually represented by the sensitivity

A

A receiver operating characteristic (ROC) curve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A pair of data items sent to a visiting user’s web browser by the visited website; consists of a key and a value, designed to represent the current state of a session between the user and the website

A

Cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A security token that does not actively do anything on its own; A security token on which the contents never change

A

Passive token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A security token that has no computing power on its own and has some variability or interaction with its surroundings; A security token on which the contents can and do change

A

Active token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A security token on which the value remains fixed

A

Static token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A security token that has computing power and on which the values can and do change

A

Dynamic token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The attack method of using a device to copy authentication data surreptitiously from an authentication token and relay that data to an attacker

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A union of separate identification and authentication systems

A

A federated identity management scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Combining authentication schemes for stronger security

A

Multifactor authentication

31
Q

The guideline that states a subject should have access to the smallest number of objects necessary to perform their tasks

A

Principle of least privilege

32
Q

The fineness or specificity of access control

A

Granularity

33
Q

A record of which subjects have been permitted what kind of access to which objects when

A

Audit log

34
Q

The act of restraining users and processes so that any harm they can do is contained in some way

A

Limited privilege

35
Q

Access control that is always invoked, tamperproof, and verifiable

A

Reference monitor

36
Q

The problem that occurs when access to a given object is provided to a given subject that should not have access to that object

A

Propagation of access rights

37
Q

A representation of access rights in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object

A

Access control matrix

38
Q

A representation of access rights in which all of the subjects that have access to a particular object are described, as well as what those subjects’ level of access to that object are; corresponds to the columns of the access control matrix

A

Access control list

39
Q

The representation of a given subject’s access rights to all objects on a system; corresponds to the rows of the access control matrix

A

Privilege list or directory

40
Q

An unforgeable token that gives the possessor certain rights to an object; represented as an access control triple of subject, object, and right

A

Capability

41
Q

The access right that provides a subject with the ability to pass copies of capabilities to other subjects

A

Transfer or propagate

42
Q

The collection of objects to which a given process has access

A

Domain

43
Q

The use of a procedure to control access to objects

A

Procedure-oriented protection

44
Q

The association of privileges with groups of users that perform similar functions

A

Role-based access control

45
Q

The process of encoding a message so that its meaning is not obvious

A

Encryption

46
Q

The process of decoding a message to make its meaning obvious

A

Decryption

47
Q

The process of translating whole words or phrases into other words or phrases

A

Encoding

48
Q

The process of translating individual characters

A

Enciphering

49
Q

The form of a message that is able to be read and understood

A

Plaintext

50
Q

The encrypted form of a message

A

Ciphertext

51
Q

C = E(P)

C = Ciphertext
E = Encryption rule
P = Plaintext

A

The formal notation for the transformation of plaintext into ciphertext

52
Q

P = D(C)

P = Plaintext
D = Decryption rule
C = Ciphertext

A

The formal notation for the transformation of ciphertext into plaintext

53
Q

P = D(E(P))

P = Plaintext
D = Decryption rule
E = Encryption rule

A

The formal notation for a complete cryptosystem

54
Q

A value used by encryption and decryption algorithms that determines how to encryption/decrypt a given message

A

Key

55
Q

The form of encryption in which both the encryption and decryption keys are the same; the same key used to encrypt is also used to decrypt

A

Symmetric key or secret key encryption

56
Q

The form of encryption in which a pair of keys are used, one for encryption and the other for decryption; one key is public and the other is private, held by the sender of ciphertext

A

Asymmetric key or public key encryption

57
Q

An encryption scheme in which a key is not required

A

Keyless cipher

58
Q

A person that studies encryption and encrypted messages for defensive purposes, making sure the codes and ciphers are solid enough to protect data adequately; they tend to work on behalf of unauthorized interceptors

A

Cryptanalyst

59
Q

A person that studies encryption and encrypted messages, usually on behalf of a legitimate sender or receiver

A

Cryptologist

60
Q

The research into and study of encryption and decryption

A

Cryptology

61
Q

The process of deducing the original meaning of ciphertext or determining the decryption algorithm for ciphertext

A

Breaking an encryption

62
Q

The point at which an encryption algorithm can be determined, given enough time and data

A

Breakable

63
Q

The difficulty of breaking an encryption

A

Work factor

64
Q

Proof that data was not modified or fabricated by any subject other than the authorized subject

A

Authenticity

65
Q

The property of symmetric encryption schemes that allows keys to be shared among users

A

Key distribution

66
Q

The process of activating, storing, and safeguarding encryption keys

A

Key management

67
Q

The encryption scheme in which data is encrypted as individual bits or bytes; think “encipher”

A

Stream encryption

68
Q

The encryption scheme is which groups of plaintext characters are encrypted as a single block; think “encode”

A

Block encryption

69
Q

The encryption algorithm that uses 64-bit blocks and a 56-bit key

A

The Data Encryption Standard (DES) algorithm

70
Q

The encryption algorithm that uses two 56-bit keys, one to encrypt, the second to decrypt, and then encrypt again with the first key

A

Two-key triple DES

71
Q

The encryption algorithm that uses three 56-bit keys, one to encrypt, the second to encrypt again or decrypt, and the third to encrypt again

A

Three-key triple DES

72
Q

The encryption algorithm that uses 128 bit blocks and 10 rounds for 128 bit keys, 12 rounds for 192 bit keys, and 14 rounds for 256 bit keys

A

Rijndael or the Advanced Encryption System (AES)

73
Q
A