Chapter 5 (5.3 B) Auth and Verification Flashcards
What are access levels
system allowing a hierarchy of access levels depending on
user’s level of security
2 Anti-malware softwares
Anti-virus
Anti-spyware
What is an anti-spyware software
how does it identify
software that detects and removes spyware programs installed on a system; Identifies spyware based on typical spyware rules or known file structures
General features of anti-spyware
name 4
» detect and remove spyware already installed on a device
» prevent a user from downloading spyware
» encrypt files to make the data more secure in case it is ‘spied’ on
» encryption of keyboard strokes to help remove the risk posed by the keylogging aspects of some spyware
» blocks access to a user’s webcam and microphone (the software stops the spyware taking over the control of a user’s webcam and microphone which can be used to collect information without the user’s knowledge)
» scans for signs that the user’s personal information has been stolen and warns the user if this has happened.
What is Authentication
the 3 questions
the process of proving a user’s identity by using:
>something they know
>something they have
>something unique to them
Char of a strong password
use special characters
use numbers
use upper and lowercase
What are biometrics
type of authentication that uses a unique human characteristic, such as fingerprints, voice or retina blood vessel pattern
Adv and disadv of fingerprint
Adv:
Easy to use
Relatively small storage requirements
Disadv:
Can be intrusive since its related to criminal identification
Inaccurate if skin is dirty or damaged
Adv and disadv of retina
Adv:
very high accuracy
no known way to replicate a person’s retina
disadv:
very intrusive
expensive to install and set up
Adv and disadv of face recog
Adv:
non-intrusive method
relatively inexpensive tech
Disadv:
Can be affected by changes in lighting, wearing glasses or a mask etc
Adv and disadv of Voice recognition
Adv:
Non-intrusive method
Verification takes less than 5 seconds (is quick)
relatively inexpensive tech
Disadv:
Low accuracy
Recordings of the person’s voice can be played to bypass
What is two factor auth
a type of authentication that requires two methods of verification to prove the identity of a user
What are patches
an update for software that is developed to improve the software and/or to remove any bugs
What all do you check in an email
Spellings
Tone of the email - shldnt be rushing
email address
misspelled domain names
suspicious links
what is typo squatting
Subtle spelling errors in website addresses used to trick users into visiting their fake websites