Chapter3 Flashcards

1
Q

RFC 4949 describe user authentication as:

A

The process of verifying an identity claimed by or for a system entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication Process

A
  • Fundamental building block and primary line of defense

- Basis of access control and user accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Step of authentication process:

A
  • Identification Step

- Verification Step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Identification Step

A
  • Presenting an identifier to the security system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Verification Step

A
  • Presenting or generating authentication information that corroborates the binding between the entity and the identifier
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The four means of authenticating user identity are based on:

A
  • Something the individual knows
  • Something the individual possess
  • Something the individual is (Static Biometrics)
  • Something the individual does (Dynamic Biometrics)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3 separated concepts for Risk assessment for user authentication

A
  • Assurance Level
  • Potential impact
  • Areas of risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Assurance level

A

Describes n organization’s degree of certainty that a user has presented a credential that refers to his or her identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Levels of Potential Impact

A
  • low
  • moderate
  • High
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Password Authentication

A
  • Widely used line of defense against intruders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The User ID:

A
  • Determines that the user is authorized to access the system.
  • Determines the user’s privileges
  • Is used in discretionary access control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Password Vulnerabilities:

A
  • Offline dictionary attack
  • Specific account attack
  • Password guessing against single user
  • Popular password attack
  • Workstation Hijacking
  • Exploiting user mistakes
  • electronic monitoring
  • exploiting multiple password use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unix Implementation Original Scheme

A
  • Up to 8 printable characters in length
  • 12-bit salt used to modify DES encryption into a one- way hash function
  • zero value repeatedly encrypted 25 times
  • output translated to 11 character sequence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Down side of original unix implementation

A
  • now regarded as inadequate.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Improved Unix implementatio

A
  • much stronger hash/salt schemes
  • OpenBSD uses Blowfish block cipher based hash algorithm call Bcrypt
  • Recommended hash function is based on MD5
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Cracking

A
  • Dictionary attacks
  • Rainbow table attacks
  • Password crackers exploit the fact that people chooses easily guessable passwords
  • John the Ripper
17
Q

Password File Access Control

A
  • Can block offline guessing attacks by denying access to encrypted passwords
  • Make available only to privileged users
  • Shadows password file
18
Q

Vulnerabilities in Password File Access Control

A
  • Weakness in the OS
  • Accident with permissions
  • users with same password on other systems
  • access from backup media
  • sniff passwords in network traffick
19
Q

Password Selection Strategies:

A
  • User Education
  • Computer generate passwords
  • reactive password checking
  • complex password policy
20
Q

Proactive Password Checking

A
  • Password Cracker
  • Rule of enforcement
  • Bloom Filter