Lecture 1 Flashcards

1
Q

How does NIST define digital user authentication?

A

The process of establishing confidence in user identities that are presented
electronically to an information system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two steps of authentication?

A

(1) Identification
(2) Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is identification vs authentication?

A

Identification: you announce who you are
Authentication: you prove that you are who you claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is authorization?

A

The process of giving someone permission to have access to something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the four (4) means of user authentication?

A

(1) Something the individual knows - PIN, pw
(2) Something the individual possesses - token
(3) Something the individual is - fingerprint, face etc
(4) Something the individual does - voice pattern, handwriting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some common password cracking strategies?

A

(1) Exhaustive search
(2) Intelligent search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a rainbow table?

A

A rainbow table is a precomputed table for storing the outputs of a cryptographic hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the rainbow table attack exploit?

A

People having very easy/guessable and short password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an exhaustive search (brute force)?

A

Try all possible combination of valid symbol up to a certain length (eg 4-digit number to guess ATM pin code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an intelligent search?

A
  • Search through restriced name space, eg. password asssociated with a user
  • Dictionary attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a dictionary attack?

A

attack where hackers try to guess a user’s password to their online accounts by quickly running through a list of commonly used words, phrases, and number combinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is password spoofing?

A

Fake login to spoof on user voluntarily entering password believing it’s the “true” login page / are mislead about the end point of the channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is sniffing attack?

A

Sniffing (listening) to catch passwords via local networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Key logger attack?

A

Key logger are software storing all keystrokes, allowing one to “spy” on password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some possible defences again key logger attacks?

A

(1) One time passwords
(2) Anti-malware programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a shoulder surfing attack?

A

Visible screen and keybords, where other may see what you are typing

17
Q

What are some possible countermeasure?

A

(1) Display failed login - indicate (failed) attack
(2) Change default password
(3) Avoid guessable passwords

18
Q

What are the advantages of SSO (single sign-on)?

A