ChatGPT Chapter 3 - User Authentication Flashcards

1
Q

User Authentication

A

The process of verifying an identity claimed by or for a system entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two steps in the authentication process

A
  1. Identification: Presenting an identifier to the security system
  2. Verification: confirm binding between the entity and the identifier
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 means of authenticating user identity

A
  1. Something individual knows (Password, PIN, answer to security questions)
  2. Something the individual possesses (Smartcard, electronic keycard, or physical key)
  3. Something the individual is (Static biometrics like fingerprint, retina or face)
  4. Something the individual does (dynamic biometrics like voice pattern, handwriting, or typing ryhythm)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is password-based authentication?

A

Method where a user provides a name (loginID) and a password, which the system compares with a stored password for that login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common vulnerabilities of password-based authentication

A
  • Electronic monitoring
  • Password guessing
  • Offline dictionary attacks
  • Specific account attacks
  • Popular password attacks
  • Workstation hijacking
  • Exploiting user mistakes
  • Exploiting multiple password use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Example of electronic monitoring

A

Malware that records every keystroke a user types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example Offline dictionary attack

A

attacker obtains database of hashed passwords and compares them against precomputed hash values of commonly used passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Example of Specific Account Attacks

A

Gathering personal information about a user to guess password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Example of workstation hijacking

A

Attacker accesses a logged-in workstation that was left unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Example of Exploiting user mistakes

A

User leaves password on a sticky note on desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Example of multiple passwords use

A

Attacker gains access to one accout and reuses the credentials to access the user’s email or banking accouts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Online vs. Offline password attacks

A

Online: Requires interaction with a service or resource
Offline: Works with intercepted or stolen data such as password hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are hashed and salted passwords?

A

Hashed passwords: Passwords transformed using a hash function

Salt: A random value added to each password before hashing to makes attacks harder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why is salting important in password storage?

A

It prevents duplicate passwords from being visible in the password file and increases the difficulty of offline dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are dictionary and rainbow table attacks?

A

Dictionary attack: Tries commonly used passwords

Rainbow Table Attack: Uses precomputed hash values for faster cracking. Salted passwords counteract this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is multi-factor authentication (MFA)?

A

Authentication that uses two or more methods

EX

  1. Something the user knows (password)
  2. Something the user has (dynamic PIN or device-generated code)
17
Q

What is a passkey?

A

A replacement for traditional passwords that uses public-key cryptography, storing the key on local devices and resisting phishing attacks

18
Q

Benefits of passkeys

A

Stored locally, reducing server-side breach impact
Better usability compared to traditional passwords

19
Q

How do passkeys resist phishing attacks?

A

Phishers don’t have access to the private key securely stored locally on device

20
Q

What are memory cards and smartcards in token-based authentication?

A

Memory cards: Store data but do not process it (magnetic stripe cards)

Smartcards: Include embedded microprocessors for authentication protocols

21
Q

What are the challenges with token-based authentication

A

Loss or theft of the token

Need for special readers

Ensuring proper repgramming and synchronization

22
Q

What is remote user authentication

A

verifying user identity over a network, requiring protocols to defend against threats eavesdropping, replay attacks, and password interception

23
Q

What is a replay attack

A

when an attacker captures a valid authentication message and reuses it to gain unauthorized access

24
Q

What are couermeasures for password vulnerabilities

A
  • Prevent unauthorized password files access
  • Intrusion detection systems
  • Account lockouts
  • Policies against common passwords
  • Regular password reissuance and training