Chapter 6 Flashcards

1
Q

What is the definition of single-factor authentication?

A

Single-factor authentication is where the user can obtain access to an account or service using one factor such as a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the definition of two-factor authentication?

A

Two-factor authentication is a security method by which users obtain access by providing two separate factors to identify themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the limitations of single-factor authentication?

A
  • Risky if same password used for many apps

- Recommended using unique password for each app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 3 different types of factors that can be used for authentication?

A
  • Knowledge factor (knowing a password/PIN number)
  • Possession factor (owning a membership card/mobile)
  • Biometric factor (human characteristic fingerprint/DNA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the bank card reader example?

what does it need and how does it work

A

Customer needs:
- PIN number (knowledge)
- Debit card (possession)
Customer places card in reader and enters PIN number. The passcode displayed on the care reader is entered into a web login page to allow the customer account access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the benefits of two-factor authentication?

A
  • Greater security

- Secure (hackers tend to avoid)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the limitations of two-factor authentication?

A
  • Phone or card/reader needed to log in

- Customers dislike the extra time taken to log in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the most commonly given password advice?

A
  • Use strong passwords (numbers, letters, symbols etc)

- Change passwords regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is access rights set up?

A

It is set up by system administrator to limit network access to relevant files only for a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is encryption used?

A

It is used to make stored data more secure, by making it unreadable to people who do not have the key to decode it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is firewall?

A
  • Firewall is designed to check incoming messages and requests for service from the system
  • Suspicious messages or request can be rerouted temporarily until it has been established
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is intrusion detection systems?

A
  • Designed to monitor the network or computer system for malicious activities
  • If an incident is detected, a report is sent to the network management
  • Further action taken if necessary to prevent any risks to the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is antivirus software?

A
  • Used to minimise the risk to data from viruses
  • This software searches the computer system for viruses and deletes them once detected
  • Treat files and attached email files from unknown sources with caution to avoid viruses getting into the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is spyware?

A
  • Spyware can be loaded into a computer system as a software virus
  • Important to run an anti-spyware program which will prevent and detect spyware from being installed
  • To remove any spyware that has previously been installed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of the acceptable use policy?

A

To ensure that members of the centre understand what is appropriate browsing behaviour, and to specify the directives necessary to protect the IT network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the acceptable internet usage?

A

The acceptable internet usage should include information on what members are encouraged to use Wi-Fi for, and that members must comply with current legislation.

17
Q

What is unacceptable behaviour?

A
  • General and system activities
  • Progress leisure interactive services
  • E-mail and communication activities
18
Q

What is the user compliance?

A

Members need to sign and date that they have understood the acceptable use policy before using the system.