Identification and Authentication Flashcards

1
Q

What is the difference between identification and authentication?

A

Identification is the process of claiming an identity, while authentication is the process of verifying that the identity is legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some common examples of identifiers?

A

Full names, account numbers, usernames, ID cards, Email addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is identity verification, and how does it differ from authentication?

A

Identity verification is showing evidence of your identity (e.g., a driver’s license), while authentication is the process of proving that the identity claim is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is falsifying identification easy?

A

Because methods like fake IDs or identity theft can easily deceive systems, requiring more than just identity verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does authentication involve?

A

Authentication involves methods used to verify if a claim of identity is true, but it doesn’t determine what the individual can do—that is authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the five factors used in authentication?

A

Something you know
Something you are
Something you have
Something you do
Where you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is multi-factor authentication (MFA)?

A

MFA uses two or more factors of authentication to verify identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is mutual authentication?

A

Mutual authentication is when both parties authenticate each other, typically in software-based systems.

Example: A client and a server authenticating each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the advantages of using complex passwords?

A

Complex passwords (long, with upper and lower case, digits, and special characters) are harder to crack and offer stronger security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the disadvantage of using passwords and how can they be managed securely?

A

Passwords are relatively weak if not complex; using a password manager helps securely store them and avoids writing them down.

Changing them often

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is biometric authentication and give an example?

A

Biometric authentication uses unique physical characteristics to verify identity, such as fingerprints, iris scans, or facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key characteristics of biometric factors?

A

Universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the False Acceptance Rate (FAR)?

A

FAR is the rate at which an authentication system falsely accepts an unauthorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the False Rejection Rate (FRR)?

A

FRR is the rate at which an authentication system wrongly rejects a legitimate user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Equal Error Rate (EER) in biometric systems?

A

EER is the point at which the FAR and FRR are equal, used to measure the overall accuracy of a biometric system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a hardware token used for in authentication?

A

A hardware token is a physical device (e.g., key fob or credit card size) that generates a changing password or pin for secure authentication.

17
Q

What are the disadvantages of using hardware tokens?

A

Hardware tokens can be lost or stolen, making them less secure than other methods.

18
Q

What is the “Something You Know” factor in authentication?

A

“Something you know” refers to information that only the user should know.

19
Q

What are some examples of “Something You Know”?

A

Password PIN

Passphrase

Security question answers (e.g., mother’s maiden name)

20
Q

What is the “Something You Are” factor in authentication?

A

“Something you are” refers to biometric characteristics unique to the user.
Example: Fingerprints, facial recognition, iris scans.

21
Q

What are some examples of “Something You Are”?

A

Fingerprints

Retinal scan

Facial recognition

Voiceprint (voice recognition)

22
Q

What is the “Something You Have” factor in authentication?

A

“Something you have” refers to physical items or digital tokens that are in the user’s possession.

23
Q

What are some examples of “Something You Have”?

A

ATM or bank cards,

Mobile phones with authentication apps (e.g., Google Authenticator),

Hardware security tokens (e.g., RSA SecurID),

USB security keys (e.g., YubiKey)

24
Q

What is the “Something You Do” factor in authentication?

A

“Something you do” refers to behavioral patterns or actions unique to the individual.

25
Q

What are some examples of “Something You Do”?

A

Keystroke dynamics (the rhythm of typing)

Gesture patterns on a touchscreen

The way you sign your name or write (signature dynamics)

26
Q

What is the “Where You Are” factor in authentication?

A

“Where you are” refers to geographical or location-based authentication, usually tied to a specific area.

27
Q

What are some examples of “Where You Are”?

A

Geolocation (GPS) to check if you are in the right location

IP address verification to determine if the access request is from a known location

Geofencing (restricting access to certain areas)

28
Q

What is the difference between Authentication and Authorization?

A

Authentication verifies identity, while Authorization determines access rights.