Lec 6: User Authentication Flashcards

1
Q

What evidence can you provide that you are who you say you are to authenticate a human to a computer?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do text passwords work? What questions do you need to consider when creating them?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the prime move issues?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the issues with password choice?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the keypoints to “Users are not the enemy” by Adams and Sasse?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the unintended consequences of reasonable ideas?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the pitfalls in username and password design that make it possible to guess repeatedly?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What were the results of [Morris & Thompson 79] Survey of 3,289 Passwords when there were no constraints on choice of password?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can users leak their passwords?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do fake authentication programs work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the Tenex password scheme work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How do you break Tenex in linear time?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can passwords be stolen in transit?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does attacking passwords in memory work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does the unix password scheme work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the solution to the Unix password scheme?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do we know if adding salt is a good solution?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How were Windows 95/98 passwords handled and what was problem with them? How were passwords dealt with in Windows NT/2000/XP?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the misc practical issues with passwords?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does password reset work?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do Graphical passwords work? What are the potential faults?

A
22
Q

What are examples of recognition-based graphical passwords?

A
23
Q

How do we solve the problem of passwords being imperfect?

A
24
Q

In general, how do one time passwords work?

A
25
Q

How do hash-chain 1-time passwords work?

A
26
Q

How does one-time passwords ith authentication work?

A
27
Q

Why do 1-time passwords work?

A
28
Q

What are other kinds of cryptographic tokens?

A
29
Q

What do one-time passwords depend on?

A
30
Q

What is biometrics? What are its advantages

A
31
Q

What are some real-world biometric ids?

A
32
Q

What is the history of fingerprinting?

A
33
Q

What are the technology issues and challenges of biometrics?

A
34
Q

How do fingerprint scanners work? What are their characteristics?

A
35
Q

How do hand scanners work? What are their characteristics?

A
36
Q

How do eye scanners work and what are their characteristics?

A
37
Q

What are other examples of biometrics?

A
38
Q

What are enrollment issues of biometrics?

A
39
Q

How do we know how strong a biometric is?

A
40
Q

How do we test non-adversarial biometric strength?

A
41
Q

When is interception used? What are the challenges?

A
42
Q

What allows spoofing to happen?

A
43
Q

What are latent fingerprints?

A
44
Q

How does fingerprint forgery work (Matsumoto)?

A
45
Q

How do you make a gummy finger from a latent print?

A
46
Q

Can adversaries just cut our finger off to pass biometrics test?

A
47
Q

What are some anti-spoof techniques?

A
48
Q

T/F: There are spoofing techniques for virtually all biometrics?

A

True

49
Q

What is one approach to stronger security using biometrics?

A
50
Q

What are the social issues involved with biometrics?

A