Domain 5 Flashcards
Uses a word list, which is predefined list of words, each of which is hashed.
dictionary attacks
appends, prepends, or changes characters in words from a dictionary before hashing in order to attempt the fastest crack of complex passwords.
Hybrid attacks
takes more time, but are more effective. Attacker calculates the hash outputs for every possible password.
Brute-force attacks
Acts as a database that contains the precomputed hashed output for most or all possible passwords.
Rainbow attacks
Allows one password to hash multiple ways.
Salt
Online technique that involves attempting to authenticate a particular user to the system.
Password Guessing
Offline technique in which the attacker has gained access to the password hashes or database.
Password Cracking
Prevents successful password guessing attacks
Account lockouts
Something you have
token - Type 2
Something you know
password/pin Type 1
Something you are
biometrics Type 3
Occurs when an authorized subject is rejected by the biometric system as unauthorized. Know as Type 1
False Reject Rate
Occurs when an unauthorized subject is accepted as valid. Known as Type 2
False Acceptance Rate
Describes the overall accuracy of a biometric system. Also describes the point where the FRR and FAR are equal.
CER
Sensitivity of a biometric system increases ____ will rise and ____ will drop
FRR and FAR