Chapter 5 (5.3 B) Auth and Verification Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are access levels

A

system allowing a hierarchy of access levels depending on
user’s level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2 Anti-malware softwares

A

Anti-virus
Anti-spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an anti-spyware software

how does it identify

A

software that detects and removes spyware programs installed on a system; Identifies spyware based on typical spyware rules or known file structures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

General features of anti-spyware

name 4

A

» detect and remove spyware already installed on a device
» prevent a user from downloading spyware
» encrypt files to make the data more secure in case it is ‘spied’ on
» encryption of keyboard strokes to help remove the risk posed by the keylogging aspects of some spyware
» blocks access to a user’s webcam and microphone (the software stops the spyware taking over the control of a user’s webcam and microphone which can be used to collect information without the user’s knowledge)
» scans for signs that the user’s personal information has been stolen and warns the user if this has happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authentication

the 3 questions

A

the process of proving a user’s identity by using:
>something they know
>something they have
>something unique to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Char of a strong password

A

use special characters
use numbers
use upper and lowercase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are biometrics

A

type of authentication that uses a unique human characteristic, such as fingerprints, voice or retina blood vessel pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Adv and disadv of fingerprint

A

Adv:
Easy to use
Relatively small storage requirements

Disadv:
Can be intrusive since its related to criminal identification
Inaccurate if skin is dirty or damaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Adv and disadv of retina

A

Adv:
very high accuracy
no known way to replicate a person’s retina

disadv:
very intrusive
expensive to install and set up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adv and disadv of face recog

A

Adv:
non-intrusive method
relatively inexpensive tech

Disadv:
Can be affected by changes in lighting, wearing glasses or a mask etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Adv and disadv of Voice recognition

A

Adv:
Non-intrusive method
Verification takes less than 5 seconds (is quick)
relatively inexpensive tech

Disadv:
Low accuracy
Recordings of the person’s voice can be played to bypass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is two factor auth

A

a type of authentication that requires two methods of verification to prove the identity of a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are patches

A

an update for software that is developed to improve the software and/or to remove any bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What all do you check in an email

A

Spellings
Tone of the email - shldnt be rushing
email address
misspelled domain names
suspicious links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is typo squatting

A

Subtle spelling errors in website addresses used to trick users into visiting their fake websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a firewall

A

software or hardware that sits between a computer and an external network and monitors and filters all incoming and outgoing traffic

17
Q

Functions of firewall

name 4

A

examine the ‘traffic’ between user’s computer

checks whether incoming or outgoing data meets a given set of criteria

Firewall blocks any traffic that fails to meet the criteria

Log all incoming and outgoing traffic

can prevent viruses or hackers from entering

18
Q

What can a firewall not control

A

Can’t prevent individuals on internal networks using their own devices from bypassing the firewall

can’t stop a user from disabling the firewall, leaving their computer susceptible to harmful traffic on the internet.

19
Q

What is a proxy server

what does it make use of to do what

A

a server that acts as an intermediary server through which internet requests are processed

it often makes use of cache memory to speed up web page access

20
Q

Features of a proxy server

A

Internet can be filtered
Helps prevents DOS since if an attack is launched it hits the proxy server
Can act as firewalls
Webserver is allowed or denied if traffic is valid or invalid

21
Q

What are privacy settings

A

Controls that allow users to limit who can access their profile or what they are allowed to see on social networking sites.

22
Q

Privacy settings features

A

‘do not track’ setting; the intention here is to stop websites collecting and using browsing data which leads to improved security

website advertising opt-outs;

safer browsing; an alert is given when the browser encounters a potentially dangerous website

23
Q

What is SSL

A

secure sockets layer (SSL) – a security protocol used when sending data over a network

24
Q

Steps of SSL

A

The user’s browser sends a message so that it can connect with the required website which is secured by SSL

Browser asks the web server to identify itself

Web server responds with its SSL certificate

Browser authenticates this certificate, a message is sent to the server to allow communication

After the message is received, the web server acknowledges the web browser and SSL-encrypted 2-way data transfer begins.

25
Q

What is an SSL certificate

A

a form of digital certificate which is used to authenticate a website; Once the SSL certificate is auth, data exchange between browser and server are secure.

26
Q

3 examples of where ssl are used

A

» online banking and all online financial transactions
» online shopping/commerce
» when sending software out to a restricted list of users
» sending and receiving emails
» using cloud storage facilities
» intranets and extranets (as well as the internet)
» Voice over Internet Protocols (VoIP) when carrying out video chatting and/or
audio chatting over the internet
» used in instant messaging
» when making use of a social networking site.

27
Q

How to ensure passwords are protected

A

run anti-spyware software to make sure that your passwords aren’t being relayed back to whoever put the spyware on your computer

change passwords on a regular basis

Use strong passwords