Lec 6: User Authentication Flashcards

1
Q

What evidence can you provide that you are who you say you are to authenticate a human to a computer?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do text passwords work? What questions do you need to consider when creating them?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the prime move issues?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the issues with password choice?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the keypoints to “Users are not the enemy” by Adams and Sasse?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the unintended consequences of reasonable ideas?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the pitfalls in username and password design that make it possible to guess repeatedly?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What were the results of [Morris & Thompson 79] Survey of 3,289 Passwords when there were no constraints on choice of password?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can users leak their passwords?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do fake authentication programs work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the Tenex password scheme work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you break Tenex in linear time?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can passwords be stolen in transit?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does attacking passwords in memory work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the unix password scheme work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the solution to the Unix password scheme?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do we know if adding salt is a good solution?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How were Windows 95/98 passwords handled and what was problem with them? How were passwords dealt with in Windows NT/2000/XP?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the misc practical issues with passwords?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does password reset work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do Graphical passwords work? What are the potential faults?

22
Q

What are examples of recognition-based graphical passwords?

23
Q

How do we solve the problem of passwords being imperfect?

24
Q

In general, how do one time passwords work?

25
How do hash-chain 1-time passwords work?
26
How does one-time passwords ith authentication work?
27
Why do 1-time passwords work?
28
What are other kinds of cryptographic tokens?
29
What do one-time passwords depend on?
30
What is biometrics? What are its advantages
31
What are some real-world biometric ids?
32
What is the history of fingerprinting?
33
What are the technology issues and challenges of biometrics?
34
How do fingerprint scanners work? What are their characteristics?
35
How do hand scanners work? What are their characteristics?
36
How do eye scanners work and what are their characteristics?
37
What are other examples of biometrics?
38
What are enrollment issues of biometrics?
39
How do we know how strong a biometric is?
40
How do we test non-adversarial biometric strength?
41
When is interception used? What are the challenges?
42
What allows spoofing to happen?
43
What are latent fingerprints?
44
How does fingerprint forgery work (Matsumoto)?
45
How do you make a gummy finger from a latent print?
46
Can adversaries just cut our finger off to pass biometrics test?
47
What are some anti-spoof techniques?
48
T/F: There are spoofing techniques for virtually all biometrics?
True
49
What is one approach to stronger security using biometrics?
50
What are the social issues involved with biometrics?